Mimic Encryption System for Network Security
With the rapid development of the Internet, increasingly more attention has been paid to network security problems. A network security defense technology has become a very important research field. Currently, most network equipment transmits data in plaintext at the data link layer, which exposes im...
Main Authors: | Bin Li, Qinglei Zhou, Xueming Si, Jinhua Fu |
---|---|
Format: | Article |
Language: | English |
Published: |
IEEE
2018-01-01
|
Series: | IEEE Access |
Subjects: | |
Online Access: | https://ieeexplore.ieee.org/document/8457203/ |
Similar Items
-
Security Verification of an Authentication Algorithm Based on Verifiable Encryption
by: Maki Kihara, et al.
Published: (2023-02-01) -
A Low Power Circuit Design for Chaos-Key Based Data Encryption
by: Ngoc Nguyen, et al.
Published: (2020-01-01) -
A randomized CPA-secure asymmetric-key chaotic color image encryption scheme based on the Chebyshev mappings and one-time pad
by: Ali Shakiba
Published: (2021-06-01) -
Research on the searchable encryption
by: Peng XU,Hai JIN
Published: (2016-10-01) -
Backward Compatible Identity-Based Encryption
by: Jongkil Kim
Published: (2023-04-01)