References
- Gupta, Purnima & Sinha, Amit & Srivastava, Prabhat & Perti, Ashwin & Singh, Aswani. (2021). Security Implementations in IoT Using Digital Signature. 10.1007/978-981-15-4692-1_40.
- Ferguson, Niels & Schneier, Bruce & Kohno, Tadayoshi. (2015). Message Authentication Codes. 10.1002/9781118722367.ch6.
- Galbally, Javier & Marcel, Sébastien & Fierrez, Julian. (2014). Biometric Antispoofing Methods: A Survey in Face Recognition. IEEE Access. 2. 1530–1552. 10.1109/ACCESS.2014.2381273.
- (2021). One Time Password (OTP) Life Cycle and Challenges: Case Study. 10.1007/978-981-15-7961-5_13.
- Rubinstein-Salzedo, Simon. (2018). Zero-Knowledge Proofs. 10.1007/978-3-319-94818-8_16.
- Wollinger, Thomas & Kumar, Sandeep. (2006). Fundamentals of Symmetric Cryptography. 10.1007/3-540-28428-1_9.
- Ranjan, Rajiv & Mukherjee, Abir & Rai, Pankaj & Ahmad, Khaleel. (2019). Asymmetric Cryptography. 10.1201/9781351021708-8.
- Ferguson, Niels & Schneier, Bruce & Kohno, Tadayoshi. (2015). Block Ciphers. 10.1002/9781118722367.ch3.
- Bray, Shannon. (2020). Stream Ciphers and Block Ciphers. 10.1002/9781119612216.ch5.
- Hawanna, Varsharani & Kulkarni, Vrushali & Rane, Rashmi & Mestri, P. & Panchal, S.. (2016). Risk Rating System of X.509 Certificates. Procedia Computer Science. 89. 152–161. 10.1016/j.procs.2016.06.027.
- Rhodes, Brandon & Goerzen, John. (2014). TLS/SSL. 10.1007/978-1-4302-5855-1_6.
- Ferrer, Marita & Gary Gutiérrez, Margarita & Hernández, Salvador. (2019). Representation of group isomorphisms I. Topology and its Applications. 263. 10.1016/j.topol.2019.05.023.
- Jassim S.A., Farhan A.K., Combined Chebyshev and logistic maps to generate pseudorandom number generator for internet of things (2022), International Journal of Electrical and Computer Engineering, 12 (3), pp. 3287–3297, DOI: 10.11591/ijece.v12i3.pp3287-3297
- Shrihari M.R., Manjunath T.N., Archana R.A., Hegadi R.S., Development of Security Performance and Comparative Analyses Process for Big Data in Cloud (2022), 789, pp. 147–160.
- Lopriore L., Cryptographic pointers for fine-grained file access security (2022), DOI: 10.1080/19393555.2022.2033365
- Susilabai S.S., Mahendran D.S., Peter S.J., A Trusted User Integrity-Based Privilege Access Control (UIPAC) for Secured Clouds (2022), 243, pp. 499–520, DOI: 10.1007/978-981-16-3675-2_38
- Fan Q., Chen J., Shojafar M., Kumari S., He D., SAKE*: A Symmetric Authenticated Key Exchange Protocol with Perfect Forward Secrecy for Industrial Internet of Things (2022), DOI: 10.1109/TII.2022.3145584
- Liu X., Guo Z., Ma J., Song Y., A Secure Authentication Scheme for Wireless Sensor Networks Based on DAC and Intel SGX (2022), 9 (5), pp. 3533–3547, DOI: 10.1109/JIOT.2021.3097996
- Liu X., Liu S., Han S., Gu D., Tightly CCAsecure inner product functional encryption scheme, (2022) Theoretical Computer Science, 898, pp. 1–19.