• Reference Citation Analysis
  • v
  • v
  • Find an Article
Find an Article PDF (4591707)   Today's Articles (0)   Subscriber (49315)
Number Citation Analysis
1
A Survey of the Security Analysis of Embedded Devices. SENSORS (BASEL, SWITZERLAND) 2023;23:9221. [PMID: 38005606 PMCID: PMC10674897 DOI: 10.3390/s23229221] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Subscribe] [Scholar Register] [Received: 10/12/2023] [Revised: 11/01/2023] [Accepted: 11/07/2023] [Indexed: 11/26/2023]
2
A Robust Memristor-Enhanced Polynomial Hyper-Chaotic Map and Its Multi-Channel Image Encryption Application. MICROMACHINES 2023;14:2090. [PMID: 38004947 PMCID: PMC10673070 DOI: 10.3390/mi14112090] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Grants] [Track Full Text] [Subscribe] [Scholar Register] [Received: 10/20/2023] [Revised: 11/07/2023] [Accepted: 11/10/2023] [Indexed: 11/26/2023]
3
Image Encryption Using a New Hybrid Chaotic Map and Spiral Transformation. ENTROPY (BASEL, SWITZERLAND) 2023;25:1516. [PMID: 37998207 PMCID: PMC10670287 DOI: 10.3390/e25111516] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Grants] [Track Full Text] [Subscribe] [Scholar Register] [Received: 09/29/2023] [Revised: 10/20/2023] [Accepted: 11/03/2023] [Indexed: 11/25/2023]
4
Adaptive Fast Image Encryption Algorithm Based on Three-Dimensional Chaotic System. ENTROPY (BASEL, SWITZERLAND) 2023;25:1399. [PMID: 37895521 PMCID: PMC10606884 DOI: 10.3390/e25101399] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Subscribe] [Scholar Register] [Received: 09/06/2023] [Revised: 09/27/2023] [Accepted: 09/27/2023] [Indexed: 10/29/2023]
5
Exploiting Dynamic Vector-Level Operations and a 2D-Enhanced Logistic Modular Map for Efficient Chaotic Image Encryption. ENTROPY (BASEL, SWITZERLAND) 2023;25:1147. [PMID: 37628177 PMCID: PMC10453646 DOI: 10.3390/e25081147] [Citation(s) in RCA: 5] [Impact Index Per Article: 5.0] [Reference Citation Analysis] [Abstract] [Key Words] [Grants] [Track Full Text] [Subscribe] [Scholar Register] [Received: 06/30/2023] [Revised: 07/28/2023] [Accepted: 07/30/2023] [Indexed: 08/27/2023]
6
Sharding-Based Proof-of-Stake Blockchain Protocols: Key Components & Probabilistic Security Analysis. SENSORS (BASEL, SWITZERLAND) 2023;23:2819. [PMID: 36905022 PMCID: PMC10007532 DOI: 10.3390/s23052819] [Citation(s) in RCA: 1] [Impact Index Per Article: 1.0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Figures] [Subscribe] [Scholar Register] [Received: 12/05/2022] [Revised: 02/16/2023] [Accepted: 02/27/2023] [Indexed: 06/18/2023]
7
Security Evaluation of Arduino Projects Developed by Hobbyist IoT Programmers. SENSORS (BASEL, SWITZERLAND) 2023;23:2740. [PMID: 36904941 PMCID: PMC10007243 DOI: 10.3390/s23052740] [Citation(s) in RCA: 2] [Impact Index Per Article: 2.0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Subscribe] [Scholar Register] [Received: 01/25/2023] [Revised: 02/20/2023] [Accepted: 02/27/2023] [Indexed: 06/18/2023]
8
Underlying Security Transmission Design for Orthogonal Time Frequency Space (OTFS) Modulation. SENSORS (BASEL, SWITZERLAND) 2022;22:7919. [PMID: 36298267 PMCID: PMC9611100 DOI: 10.3390/s22207919] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Figures] [Subscribe] [Scholar Register] [Received: 09/13/2022] [Revised: 10/05/2022] [Accepted: 10/08/2022] [Indexed: 06/16/2023]
9
Security and Privacy Analysis of Smartphone-Based Driver Monitoring Systems from the Developer's Point of View. SENSORS (BASEL, SWITZERLAND) 2022;22:5063. [PMID: 35808558 PMCID: PMC9269856 DOI: 10.3390/s22135063] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [MESH Headings] [Track Full Text] [Figures] [Subscribe] [Scholar Register] [Received: 06/03/2022] [Revised: 06/28/2022] [Accepted: 07/01/2022] [Indexed: 06/15/2023]
10
An Efficient Chosen-Plaintext Attack on an Image Fusion Encryption Algorithm Based on DNA Operation and Hyperchaos. ENTROPY 2021;23:e23070804. [PMID: 34202581 PMCID: PMC8304709 DOI: 10.3390/e23070804] [Citation(s) in RCA: 2] [Impact Index Per Article: 0.7] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 05/04/2021] [Revised: 06/16/2021] [Accepted: 06/21/2021] [Indexed: 11/17/2022]
11
Security Analysis and Improvement of an Image Encryption Cryptosystem Based on Bit Plane Extraction and Multi Chaos. ENTROPY 2021;23:e23050505. [PMID: 33922307 PMCID: PMC8145506 DOI: 10.3390/e23050505] [Citation(s) in RCA: 8] [Impact Index Per Article: 2.7] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 04/05/2021] [Revised: 04/18/2021] [Accepted: 04/20/2021] [Indexed: 11/18/2022]
12
COVID-19 Contact Tracing Using Blockchain. IEEE ACCESS : PRACTICAL INNOVATIONS, OPEN SOLUTIONS 2021;9:62956-62971. [PMID: 34812392 PMCID: PMC8545209 DOI: 10.1109/access.2021.3074753] [Citation(s) in RCA: 2] [Impact Index Per Article: 0.7] [Reference Citation Analysis] [Abstract] [Key Words] [Grants] [Track Full Text] [Figures] [Subscribe] [Scholar Register] [Received: 04/04/2021] [Accepted: 04/18/2021] [Indexed: 06/13/2023]
13
Blockchain-Based Forward Supply Chain and Waste Management for COVID-19 Medical Equipment and Supplies. IEEE ACCESS : PRACTICAL INNOVATIONS, OPEN SOLUTIONS 2021;9:44905-44927. [PMID: 34812386 PMCID: PMC8545229 DOI: 10.1109/access.2021.3066503] [Citation(s) in RCA: 16] [Impact Index Per Article: 5.3] [Reference Citation Analysis] [Abstract] [Key Words] [Grants] [Track Full Text] [Subscribe] [Scholar Register] [Received: 03/02/2021] [Accepted: 03/12/2021] [Indexed: 05/22/2023]
14
A comprehensive survey on smart contract construction and execution: paradigms, tools, and systems. PATTERNS (NEW YORK, N.Y.) 2021;2:100179. [PMID: 33659907 PMCID: PMC7892363 DOI: 10.1016/j.patter.2020.100179] [Citation(s) in RCA: 4] [Impact Index Per Article: 1.3] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Indexed: 11/03/2022]
15
Cryptographic Algorithm Using Newton-Raphson Method and General Bischi-Naimzadah Duopoly System. ENTROPY 2020;23:e23010057. [PMID: 33396342 PMCID: PMC7824367 DOI: 10.3390/e23010057] [Citation(s) in RCA: 2] [Impact Index Per Article: 0.5] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 11/07/2020] [Revised: 12/25/2020] [Accepted: 12/26/2020] [Indexed: 11/17/2022]
16
SACT: A New Model of Covert Communication Based on SDN. SENSORS (BASEL, SWITZERLAND) 2020;20:s20247300. [PMID: 33352629 PMCID: PMC7767162 DOI: 10.3390/s20247300] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Figures] [Subscribe] [Scholar Register] [Received: 11/06/2020] [Revised: 12/09/2020] [Accepted: 12/15/2020] [Indexed: 06/12/2023]
17
A Chaotic-Based Encryption/Decryption Framework for Secure Multimedia Communications. ENTROPY 2020;22:e22111253. [PMID: 33287021 PMCID: PMC7712162 DOI: 10.3390/e22111253] [Citation(s) in RCA: 25] [Impact Index Per Article: 6.3] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 09/10/2020] [Revised: 10/20/2020] [Accepted: 10/28/2020] [Indexed: 12/03/2022]
18
Deep Learning-Based Security Verification for a Random Number Generator Using White Chaos. ENTROPY (BASEL, SWITZERLAND) 2020;22:E1134. [PMID: 33286903 PMCID: PMC7597277 DOI: 10.3390/e22101134] [Citation(s) in RCA: 4] [Impact Index Per Article: 1.0] [Reference Citation Analysis] [Abstract] [Key Words] [Grants] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 08/10/2020] [Revised: 09/28/2020] [Accepted: 10/04/2020] [Indexed: 11/16/2022]
19
Designing Two Secure Keyed Hash Functions Based on Sponge Construction and the Chaotic Neural Network. ENTROPY (BASEL, SWITZERLAND) 2020;22:E1012. [PMID: 33286780 PMCID: PMC7597085 DOI: 10.3390/e22091012] [Citation(s) in RCA: 11] [Impact Index Per Article: 2.8] [Reference Citation Analysis] [Abstract] [Key Words] [Grants] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 07/16/2020] [Revised: 08/19/2020] [Accepted: 08/27/2020] [Indexed: 11/17/2022]
20
A Novel Hybrid Secure Image Encryption Based on the Shuffle Algorithm and the Hidden Attractor Chaos System. ENTROPY 2020;22:e22060640. [PMID: 33286412 PMCID: PMC7517175 DOI: 10.3390/e22060640] [Citation(s) in RCA: 5] [Impact Index Per Article: 1.3] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 05/26/2020] [Revised: 06/04/2020] [Accepted: 06/05/2020] [Indexed: 11/24/2022]
21
A New Image Encryption Algorithm Based on Composite Chaos and Hyperchaos Combined with DNA Coding. ENTROPY 2020;22:e22020171. [PMID: 33285946 PMCID: PMC7516590 DOI: 10.3390/e22020171] [Citation(s) in RCA: 25] [Impact Index Per Article: 6.3] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 12/18/2019] [Revised: 01/31/2020] [Accepted: 01/31/2020] [Indexed: 12/21/2022]
22
Suggested Integral Analysis for Chaos-Based Image Cryptosystems. ENTROPY 2019;21:e21080815. [PMID: 33267528 PMCID: PMC7515344 DOI: 10.3390/e21080815] [Citation(s) in RCA: 42] [Impact Index Per Article: 8.4] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 07/02/2019] [Revised: 08/01/2019] [Accepted: 08/08/2019] [Indexed: 11/16/2022]
23
An Algorithm of Image Encryption Using Logistic and Two-Dimensional Chaotic Economic Maps. ENTROPY 2019;21:e21010044. [PMID: 33266760 PMCID: PMC7514150 DOI: 10.3390/e21010044] [Citation(s) in RCA: 34] [Impact Index Per Article: 6.8] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 11/26/2018] [Revised: 12/30/2018] [Accepted: 12/31/2018] [Indexed: 11/24/2022]
24
Encryption Algorithm of Multiple-Image Using Mixed Image Elements and Two Dimensional Chaotic Economic Map. ENTROPY 2018;20:e20100801. [PMID: 33265888 PMCID: PMC7512365 DOI: 10.3390/e20100801] [Citation(s) in RCA: 26] [Impact Index Per Article: 4.3] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 09/15/2018] [Revised: 10/15/2018] [Accepted: 10/16/2018] [Indexed: 11/16/2022]
25
Finite-block-length analysis in classical and quantum information theory. PROCEEDINGS OF THE JAPAN ACADEMY. SERIES B, PHYSICAL AND BIOLOGICAL SCIENCES 2017;93:99-124. [PMID: 28302962 PMCID: PMC5422578 DOI: 10.2183/pjab.93.007] [Citation(s) in RCA: 3] [Impact Index Per Article: 0.4] [Reference Citation Analysis] [Abstract] [Key Words] [MESH Headings] [Track Full Text] [Figures] [Subscribe] [Scholar Register] [Received: 10/08/2016] [Accepted: 12/26/2016] [Indexed: 06/06/2023]
26
Simulation of Attacks for Security in Wireless Sensor Network. SENSORS 2016;16:s16111932. [PMID: 27869710 PMCID: PMC5134591 DOI: 10.3390/s16111932] [Citation(s) in RCA: 29] [Impact Index Per Article: 3.6] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 08/24/2016] [Revised: 11/03/2016] [Accepted: 11/09/2016] [Indexed: 11/16/2022]
PrevPage 1 of 1 1Next
© 2004-2024 Baishideng Publishing Group Inc. All rights reserved. 7041 Koll Center Parkway, Suite 160, Pleasanton, CA 94566, USA