Cryptography
Tarun Kumar, Prabhat Kumar, Suyel Namasudra (2024). "User Revocation-Enabled Access Control Model Using Identity-Based Signature in the Cloud Computing Environment", International Journal of Interactive Multimedia and Artificial Intelligence, vol. 9, issue Regular issue, no. 1, pp. 127-136. https://doi.org/10.9781/ijimai.2024.05.001 |
Dawit Dejene, Basant Tiwari, Vivek Tiwari (2020). "TD2SecIoT: Temporal, Data-Driven and Dynamic Network Layer Based Security Architecture for Industrial IoT", International Journal of Interactive Multimedia and Artificial Intelligence, vol. 6, issue Regular Issue, no. 4, pp. 146-156. https://doi.org/10.9781/ijimai.2020.10.002 |
Jefferson Rodríguez, Brayan Corredor, César Suárez (2019). "Genetic Operators Applied to Symmetric Cryptography", International Journal of Interactive Multimedia and Artificial Intelligence, vol. 5, issue Regular Issue, no. 7, pp. 39-49. https://doi.org/10.9781/ijimai.2019.07.006 |
M Fraile-Hurtado, M Herrero-Langreo, P Menéndez-Miguel, V Delgado-Villanueva (2010). "Biometry, the safe key", International Journal of Interactive Multimedia and Artificial Intelligence, vol. 1, issue A Direct Path to Intelligent Tools, no. 3, pp. 32-36. https://doi.org/10.9781/ijimai.2010.136 |