Quantum Cryptanalysis Using Digital Ant in Pervasive Environment
Abstract
Full Text:
PDFReferences
D. Frincke, A. Wespi, and D. Zamboni, “From intrusion detection to self-protection,” Computer Networks, vol. 51, 2007, pp. 1233–1238.
E.A.R. Dahiyat, “Intelligent agents and intentionality: Should we begin to think outside the box?”Computer Law Security Rep., vol. 22, 2006, pp. 472–480.
F. Bellifemine, G. Caire, D. Greenwood, DevelopingMulti-Agent Systems with JADE, Wiley & Assoc, 2007.
J. Haack., G. Fink, E. Fulp, and W. Maiden, “Cooperative Infrastructure Defense,” presented at the Workshop on Visualization for Computer Security (VizSec), 2008,
M.B. Scher, “On doing ‘being reasonable login”, vol. 31, 2006, pp. 40–47.
Zhen Chen, “A Lightweight Encryption Algorithm for Images”, Advances in Intelligent and Soft Computing, 2012.
Adnan M. Alattar, “Improved Selective Encryption Techniques for Secure Transmission of Mpeg Video Bit-Streams”, ICIP, 1999.
Mohammed AF. Al-Husainy, “Image Encryption Using Genetic Algorithm”, Information Technology Journal Asian Network for Scientific Information, 2006.
Wenjun Zeng et al, “A multi-layer key stream based approach for joint encryption and Compression of H.264 video”, IEEE International Conference on Multimedia and Expo, 2011.
Yong Wang et.al, “A new chaos based fast image encryption algorithm”, Applied Soft Computing, 2011.
DOI: https://doi.org/10.37628/ijtet.v2i2.366
Refbacks
- There are currently no refbacks.