Cryptography

In Press
Tarun Kumar, Prabhat Kumar, Suyel Namasudra (In Press). "User Revocation-Enabled Access Control Model Using Identity-Based Signature in the Cloud Computing Environment", International Journal of Interactive Multimedia and Artificial Intelligence, vol. In press, issue In press, no. In press, pp. 1-10. https://doi.org/10.9781/ijimai.2024.05.001
2020
Dawit Dejene, Basant Tiwari, Vivek Tiwari (2020). "TD2SecIoT: Temporal, Data-Driven and Dynamic Network Layer Based Security Architecture for Industrial IoT", International Journal of Interactive Multimedia and Artificial Intelligence, vol. 6, issue Regular Issue, no. 4, pp. 146-156. https://doi.org/10.9781/ijimai.2020.10.002
2019
Jefferson Rodríguez, Brayan Corredor, César Suárez (2019). "Genetic Operators Applied to Symmetric Cryptography", International Journal of Interactive Multimedia and Artificial Intelligence, vol. 5, issue Regular Issue, no. 7, pp. 39-49. https://doi.org/10.9781/ijimai.2019.07.006
2010
M Fraile-Hurtado, M Herrero-Langreo, P Menéndez-Miguel, V Delgado-Villanueva (2010). "Biometry, the safe key", International Journal of Interactive Multimedia and Artificial Intelligence, vol. 1, issue A Direct Path to Intelligent Tools, no. 3, pp. 32-36. https://doi.org/10.9781/ijimai.2010.136