[1]
|
J. Ahmad and S. O. Hwang, Chaos-based diffusion for highly autocorrelated data in encryption algorithms, Nonlinear Dynamics, 82 (2015), 1839-1850.
doi: 10.1007/s11071-015-2281-0.
|
[2]
|
A. U. Ahmed, S. Rahman and B. Davvaz, On intuitionistic fuzzy idempotent, prime, strongly irreducible and t-pure ideals of semirings, Journal of Intelligent & Fuzzy Systems, 33 (2017), 433-443.
|
[3]
|
T. Aste, P. Tasca and T. D. Matteo, Blockchain technologies: The foreseeable impact on society and industry, Computer, 50 (2017), 18-28.
|
[4]
|
H. Chen, X. Du and Z. Liu, Optical hyperspectral data encryption in spectrum domain by using 3d arnold and gyrator transforms, Spectroscopy Letters, 49 (2016), 103-107.
|
[5]
|
Y. Chen, Mean square exponential stability of uncertain singular stochastic systems with discrete and distributed delays, Journal of Computational & Applied Mathematics, 20 (2014), 13-26.
|
[6]
|
P. Cheng, H. Yang, P. Wei and W. Zhang, A fast image encryption algorithm based on chaotic map and lookup table, Nonlinear Dynamics, 79 (2015), 2121-2131.
|
[7]
|
W. D. H., Data authentication and security assurance based on distributed storage system, Journal of China Academy of Electronics and Information Technology, 6 (2015), 613-619.
|
[8]
|
P. Fairley, Blockchain world - feeding the blockchain beast if bitcoin ever does go mainstream, the electricity needed to sustain it will be enormous, IEEE Spectrum, 54 (2017), 36-59.
|
[9]
|
W. Gao and W. Wang, A tight neighborhood union condition on fractional (g, f, n', m)-critical deleted graphs, Colloquium Mathematicum, 149 (2017), 291-298.
doi: 10.4064/cm6959-8-2016.
|
[10]
|
L. Guo and L. University, Big data encryption to protect privacy data environment improvement and simulation of the algorithm, Computer Simulation, 338-341.
|
[11]
|
T. Hua, J. Chen, D. Pei, W. Zhang and N. Zhou, Quantum image encryption algorithm based on image correlation decomposition, International Journal of Theoretical Physics, 54 (2015), 526-537.
|
[12]
|
Y. Jiang, G. Li, W. Che, Y. Liu, B. Xu, G. Shan, D. Zhu, Z. Su and M. R. Bryce, A neutral dinuclear ir(ⅲ) complex for anti-counterfeiting and data encryption, Chemical Communications, 53 (2017), 3022-3025.
|
[13]
|
K. Lata, Secure data aggregation in wireless sensor networks using homomorphic encryption, International Journal of Electronics, 102 (2015), 690-702.
|
[14]
|
Z. L. F., Research on new data encryption algorithm in big data environment, Bulletin of Science and Technology, 205-208.
|
[15]
|
H. Y. Lin, Location-based data encryption for wireless sensor network using dynamic keys, Wireless Networks, 21 (2015), 1-8.
|
[16]
|
S. Lopez and F. Muntaner-Batle, Rainbow eulerian multidigraphs and the product of cycles, Discrete Mathematics and Theoretical Computer Science, 17 (2016), 91-104.
|
[17]
|
A. Panchbudhe, System and method for combining deduplication and encryption of data, 2015.
|
[18]
|
K. Suthar and J. Patel, Encryscation: An secure approach for data security using encryption and obfuscation techniques for iaas and daas services in cloud environment, Astrophysical Journal, 663 (2017), 799-807.
|
[19]
|
X. J. Tong, Z. Wang and M. Zhang, et al., An image encryption algorithm based on the perturbed high-dimensional chaotic map, Nonlinear Dynamics, 80 (2015), 1493-1508.
doi: 10.1007/s11071-015-1957-9.
|
[20]
|
X. Yang, Z. Shen, X. Hu and W. Hu, Chaotic encryption algorithm against chosen-plaintext attacks in optical ofdm transmission, IEEE Photonics Technology Letters, 28 (2016), 2499-2502.
|
[21]
|
G. Ye and X. Huang, An image encryption algorithm based on autoblocking and electrocardiography, IEEE Multimedia, 23 (2016), 64-71.
|
[22]
|
H. Q. Zhang, Y. Z. Zhao and Z. Xu, Encryption and decryption algorithm based on rotation matrix, J. Jilin Univ. Sci., 54 (2016), 229-233.
|
[23]
|
Q. Zhao, Computer simulation of reliability algorithm for wind-induced vibration response control of high structures, Journal of Discrete Mathematical Sciences & Cryptography, 20 (2017), 1519-1523.
|