Diskussion:Honey Encryption

Letzter Kommentar: vor 2 Jahren von Minderbinder in Abschnitt Literatur

Literatur

Bearbeiten

Review und Methode:

  • P Dharshini, J Arokia Renjith, P Mohan Kumar: Screening the covert key using honey encryption to rule out the brute force attack of AES—a survey. In: Security and Communication Networks. Volume 9, Issue 18 (3. Februar 2017), doi:10.1002/sec.1753
  • Omolara, Jantan et al.: Modified honey encryption scheme for encoding natural language message. In: International Journal of Electrical & Computer Engineering. Vol. 9, Issue 3 (Juni 2019), S. 1871-1878, doi:10.11591/ijece.v9i3.pp1871-1878

Beispiele für Anwendungen:

  • R Mahaveerakannan, C Suresh Gnana Dhas: Big data analytics for large-scale UAV-MBN in quantum networks using efficient hybrid GKM. In: Concurrency and Computation: Practice and Experience. Volume 34, Issue 7 (7. November 2019), doi:10.1002/cpe.5559
  • Muhalb M Alsaffar, Mohammad Hasan, Gavin P McStay, Mohamed Sedky: Digital DNA lifecycle security and privacy: an overview. In: Briefings in Bioinformatics. Volume 23, Issue 2, (31 Januar 2022), doi:10.1093/bib/bbab607
  • Abiodun, Jantan et al: Reinforcing the Security of Instant Messaging Systems Using an Enhanced Honey Encryption Scheme: The Case of WhatsApp. In: Wireless Personal Communications, Vol. 112 Issue 4 (Juni 2020), S. 2533-2556. doi:10.1007/s11277-020-07163-y

Weitere wiss. Artikel (ca. 15) sind über EBSCO zu finden. --Minderbinder 14:58, 26. Jul. 2022 (CEST)Beantworten