참고문헌
- Hindi, A., Dr. Dwairi, M., Alqadi, Z.: Analysis of Procedures used to Build an Optimal Fingerprint Recognition System. International Journal of Computer Science and Mobile Computing 9(2), 21-37 (2020) https://doi.org/10.47760/ijcsmc.2020.v09i11.002
- Zahran, B., Ayyoub, B., Nader, J., Al-Qadi, Z.: Suggested Method to Create Color Image Features Victor. Journal of Engineering and Applied Sciences 14(1), 2203-2207 (2019) https://doi.org/10.36478/jeasci.2019.2203.2207
- Abdul Elminaam, D., Abdul Kader, H. and Hadhoud, M.: Performance Evaluation of Symmetric Encryption Algorithms. IJCSNS International Journal of Computer Science and Network Security 8(12), 280-286 (2008)
- Stallings, W.: Cryptography and Network Security, 4th Edition, Pearson Prentice Hall, 2006.
- Preet, S., Raman, M.: Comparison of Data Encryption Algorithms. International Journal of Computer science and Communications 2(1), pp. 125-127 (2011)
- Gurjeevan, S., Ashwani, K., Sandha, K.S.: A Study of New Trends in Blowfish Algorithm. International Journal of Engineering Research and Applications (IJERA) 1(2), pp.321-326 (2018)
- Monika, A., Pradeep, M.: A Comparative Survey on Symmetric Key Encryption Techniques. International Journal on Computer Science and Engineering (IJCSE) 4(5), pp. 877-882 (2012)
- Li, P., Chen, Z., Yang, L. T., Zhao, L. , and Zhang, Q.: A Privacy-preserving High-order Neuro-fuzzy C-means Algorithm with Cloud Computing. Neurocomputing 256, pp. 82-89 (2017) https://doi.org/10.1016/j.neucom.2016.08.135
- Yin, S., and Liu, J.: A K-means Approach for Map-reduce Model and Social Network Privacy Protection. Journal of Information Hiding and Multimedia Signal Processing 7(6), pp. 1215-1221 (2016)
- Teng, L., Li, H., Liu, J., and Yin, S.: An Efficient and Secure Cipher-text Retrieval Scheme Based on Mixed Homomorphic Encryption and Multi-attribute Sorting Method. International Journal of Network Security 20(5), pp. 872-878 (2018)
- Elgendy, I., Zhang, W., Liu, C., and Hsu, C.: An Efficient and Secured Framework for Mobile Cloud Computing. IEEE Transactions on Cloud Computing 9(1), pp. 79-87 (2018) https://doi.org/10.1109/TCC.2018.2847347
- Karthikeyan, B., Sasikala, T., and Priya, S. B.: Key Exchange Techniques Based on Secured Energy Efficiency in Mobile Cloud Computing. Applied Mathematics & Information Sciences 13(6), pp. 1039-1045 (2019) https://doi.org/10.18576/amis/130618
- B. Karthikeyan, T. Sasikala, and S. B. Priya, "Key exchange techniques based on secured energy efficiency in mobile cloud computing," Applied Mathematics & Information Sciences, vol. 13, no. 6, pp. 1039-1045, 2019. https://doi.org/10.18576/amis/130618
- Xu, J. Wei, L., Wu, W., Wang, A., Zhang, Y., and Zhou ,F.: Privacy-preserving Data Integrity Verification by using Lightweight Streaming Authenticated Data Structures for Healthcare Cyber-physical System. Future Generation Computer Systems 108, pp. 1287-1296 (2020) https://doi.org/10.1016/j.future.2018.04.018
- Haseeb, K., Almgren, A., Ud Din, I., Islam, N., and Altameem, A.: SASC: Secure and Authentication-based Sensor Cloud architecture for intelligent Internet of Things. Sensors 20(9), pp. 2468-2486 (2020) https://doi.org/10.3390/s20092468
- Zhu, H., Yuan, Y., Chen, Y., et al.: A Secure and Efficient Data Integrity Verification Scheme for Cloud-IoT Based on Short Signature. IEEE Access 7, pp.9003-90044 (2019)
- Zhang, Z., and Luo, J.: A Data Value Classification and Encryption Mechanism Based on Metadata Attributes. Journal of Northwest University 46(2) pp. 188-194 (2016)
- Mehrotra S., Rajan, M.: Comparative Analysis of Encryption Algorithm for Data Communication. International Journal of Computer Science and Technology 2(2), pp. 292-294 (2011)
- Chandra M.: Superiority of Blowfish Algorithm. IJARCSSE 2(9), pp. 196-201 (2012)
- Yogesh, K. A.: Comparative Study of Different Symmetric Key Cryptography. International Journal of Application or Innovation in Engineering & Management (IJAIEM) 2(7), pp. 204-206 (2013)
- Abdul, D.S., Kader, H.M., Abdul, Hadhoud, M.M.: Performance Evaluation of Symmetric Encryption Algorithms. Communications of the IBIMA 8, pp. 58-64 (2009)
- Jawahar, T., Nagesh, K.: DES, AES and Blowfish Symmetric Key Cryptography Algorithm Simulation Based Performance Analysis. The International Journal of Emerging Technology and Advanced Engineering IJETAE 1(2), pp. 6-12 (2011)
- Mohit, M., Rajeev, B., Amritpal, S., Tejinder, S.: Comparative Analysis of Cryptographic Algorithms. International Journal of Advanced Engineering Technology, pp.16-18 (2018)
- Imran, A., Rafeek, K.: Performance and Efficiency Analysis of Different Block Cipher Algorithms of Symmetric Key Cryptography. International Journal of Advanced Research in Computer Science and Software Engineering 3(10), pp.713-(2013)
- Riman, C., and Hallal, H.: DES Based Educational Data Encryption System. International Conference on Security and Management (WORLDCOMP'13) (2013)