Securing Privacy in BSN with Chaos Based Image Encryption Scheme
Abstract
Full Text:
PDFReferences
Shamir, A. : (1985) “Identity-Based Cryptosystems and Signature Schemes” CRYPTO’85 , 196: 47–53.
Boneh, D.; Franklin, M.: (2001) “Identity-Based Encryption from the Weil Pairing” CRYPTO’01, 2139: 213–229.
A. Abd Manaf et al.: (2011) “A Study of Attribute-Based Encryption for Body Sensor Networks” ICIEIS,251: 238–247.
Jang, C.S.; Lee, D.G.; Han, J.-W.; Park, J.H.: (2011) “Hybrid security protocol for wireless body area networks”, 11: 277–288.
Bao, S.D.; Shen, L.F.; Zhang, Y.T. : (2004) “A Novel Key Distribution of Body Area Networks for Telemedicine, In Proceedings of the 2004 IEEE International Workshop on Biomedical Circuits and Systems”, 1-
Fridrich, J.: (1998) “Symmetric Ciphers Based on Two-Dimensional Chaotic Maps”, 8: 1259–1284.
M. S. Baptista. : (1998) “Cryptography with chaos,” 240: 50–54.
R. Matthews. : (1989) “On the derivation of a chaotic encryption algorithm” 13: 29-42.
S.Li et al.: (2004) “Baptista-type chaotic cryptosystems: problems and countermeasures” 332: 368-375.
R.M. May. : (1976) “Simple mathematical models with very complicated dynamics” 261: 459–467.
Refbacks
- There are currently no refbacks.