Have a personal or library account? Click to login

Application of Amicable Numbers in Cryptographic Data Protection Methods

Open Access
|Sep 2025

References

  1. Ashton, K. That “Internet of Things” Thing: In the Real World Things Matter More than Ideas. – RFID Journal, 2009.
  2. Sorri, K., N. Mustafee, M. Seppänen. Revisiting IoT Definitions: A Framework towards Comprehensive Use. – Technological Forecasting and Social Change, Vol. 179, 06.2022, 121623.
  3. H. Sundmaeker, P. Guillemin, P. Friess, S. Woelfflé, Eds. Vision and Challenges for Realising the Internet of Things. European Commission, Information Society and Media, Brussels, 2010.
  4. Liu, R., J. Wang. Internet of Things: Application and Prospect. – MATEC Web of Conferences, 2017, 100. 02034. DOI: 10.1051/matecconf/201710002034.
  5. Rahoof, P., L. Nair, V. Ijyas. Trust Structure in Public Key Infrastructures. 2017, pp. 223-227. DOI: 10.1109/Anti-Cybercrime.2017.7905295.
  6. Vollala, S., N. Ramasubramanian, U. Tiwari. Public Key Cryptography. 2021. DOI: 10.1007/978-3-030-74524-0_2.
  7. Canteaut, A. Stream Cipher. 2011. DOI: 10.1007/0-387-23483-7_412.
  8. Singh, M., R., Khandakar. Digital Signatures. 2021. DOI: 10.1007/978-3-030-60890-3_14.
  9. Zhao, Z. An Efficient Anonymous Authentication Scheme for Wireless Body Area Networks Using Elliptic Curve Cryptosystem. – Journal of Medical Systems, Vol. 38, 2014, No 13. DOI: 10.1007/s10916-014-0013-5.
  10. Kahn, D. The Codebreakers: The Comprehensive History of Secret Communication from Ancient Times to the Internet. Scribner, 1996. ISBN 0684831309.
  11. Barnes, J. Amicable Numbers. 2016. DOI: 10.1007/978-3-319-46831-0_2.
  12. Pomerance, C. On Amicable Numbers. 2015. DOI: 10.1007/978-3-319-22240-0_19.
  13. Sadiku, M., C. Akujuobi. Fundamentals of Computer Networks. 2022. DOI: 10.1007/978-3-031-09417-0.
  14. Chahar, N. Computer Network Security. – International Journal of Innovative Research in Science, Engineering and Technology, Vol. 7, 2022. 1031. DOI: 10.5281/zenodo.6448170.
  15. Li, Y., S. Schäge, Z. Yang, F. Kohlar, J. Schwenk. On the Security of the Pre-Shared Key Ciphersuites of TLS. 2014. DOI: 10.1007/978-3-642-54631-0_38.
  16. Hwang, Min-Shiang, et al. An Access Control Based on a Scheme Chinese Theorem Remainder and Time Stamp Concept. 2003.
  17. Parkinson, S., S. Khana. Identifying High-Risk Over-Entitlement in Access Control Policies Using Fuzzy Logic. – Cybersecurity, Vol. 5, 2022, No 6. DOI: 10.1186/s42400-022-00112-1.
  18. Desmedt, Y., A. Shaghaghi. Function-Based Access Control (FBAC): From Access Control Matrix to Access Control Tensor. 2016, pp. 89-92.
  19. Penelova, M. Access Control Models. – Cybernetics and Information Technologies. Vol. 21, 2021, No 4, pp. 77-104.
  20. Denis, T., S. Johnson. Hash Functions. (2006). DOI: 10.1016/B978-159749104-4/50008-X.
  21. Bogdanov, A. A Gentle Introduction to Zero-Knowledge. 2022. DOI: 10.1007/978-3-031-04206-5_1.
  22. Rastogi, N., P. Avinav, R. Shweta. Enhanced Authentication Scheme Using Password Integrated Challenge Response Protocol. – International Journal of Computer Applications, Vol. 62, 2013, pp. 15-19. DOI: 10.5120/10107-4764.
  23. Al-Maliki, O., H. Al-Assam. Challenge-Response Mutual Authentication Protocol for EMV Contactless Cards. – Computers & Security, Vol. 103, 2021, 102186. DOI: 10.1016/j.cose.2021.102186.
DOI: https://doi.org/10.2478/cait-2025-0024 | Journal eISSN: 1314-4081 | Journal ISSN: 1311-9702
Language: English
Page range: 88 - 103
Submitted on: Apr 7, 2025
Accepted on: Jun 17, 2025
Published on: Sep 25, 2025
Published by: Bulgarian Academy of Sciences, Institute of Information and Communication Technologies
In partnership with: Paradigm Publishing Services
Publication frequency: 4 issues per year

© 2025 Tomasz Krokosz, published by Bulgarian Academy of Sciences, Institute of Information and Communication Technologies
This work is licensed under the Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 License.