Cryptography
Yesid Díaz Gutiérrez, Juan Manuel Cueva-Lovelle, Diana Carolina Candia Herrera (In Press). "Security Model For the Internet of Things, Through Blockchain", International Journal of Interactive Multimedia and Artificial Intelligence, vol. In press, issue In press, no. In press, pp. 1-9. https://doi.org/10.9781/ijimai.2025.02.008 |
Tarun Kumar, Prabhat Kumar, Suyel Namasudra (2024). "User Revocation-Enabled Access Control Model Using Identity-Based Signature in the Cloud Computing Environment", International Journal of Interactive Multimedia and Artificial Intelligence, vol. 9, issue Regular issue, no. 1, pp. 127-136. https://doi.org/10.9781/ijimai.2024.05.001 |
Dawit Dejene, Basant Tiwari, Vivek Tiwari (2020). "TD2SecIoT: Temporal, Data-Driven and Dynamic Network Layer Based Security Architecture for Industrial IoT", International Journal of Interactive Multimedia and Artificial Intelligence, vol. 6, issue Regular Issue, no. 4, pp. 146-156. https://doi.org/10.9781/ijimai.2020.10.002 |
Jefferson Rodríguez, Brayan Corredor, César Suárez (2019). "Genetic Operators Applied to Symmetric Cryptography", International Journal of Interactive Multimedia and Artificial Intelligence, vol. 5, issue Regular Issue, no. 7, pp. 39-49. https://doi.org/10.9781/ijimai.2019.07.006 |
M Fraile-Hurtado, M Herrero-Langreo, P Menéndez-Miguel, V Delgado-Villanueva (2010). "Biometry, the safe key", International Journal of Interactive Multimedia and Artificial Intelligence, vol. 1, issue A Direct Path to Intelligent Tools, no. 3, pp. 32-36. https://doi.org/10.9781/ijimai.2010.136 |