References
- Dixit, P., Gupta, A. K., Trivedi, M. C., & Yadav, V. K. (2018). Traditional and hybrid encryption techniques: a survey. In Networking communication and data knowledge engineering (pp. 239-248). Springer, Singapore.
- Belal, A. A., & Abdel-Gawad, M. A. (2001, March). 2D-encryption mode. In Second NIST Modes of Operation Workshop.
- Varshney, N., & Qadeer, M. A. (2012). Non-Uniform Steps Model: New Layer to Traditional Security Encryption Algorithms (Next-Generation Data Security Layer). International Journal of Engineering and Technology, 4(6), 808. https://doi.org/10.7763/IJET.2012.V4.489
- Zeng, D. X., Li, M., Wang, J. J., Hou, Y. L., Lu, W. J., & Huang, Z. (2018). Overview of Rubik's cube and reflections on its application in the mechanism. Chinese Journal of Mechanical Engineering, 31(1), 1-12. https://doi.org/10.1186/s10033-018-0219-4
- M. Bellare, A. Desai, E. Jokipii, P. Rogaway, "A Concrete Security Treatment of Symmetric Encryption: Analysis of the DES Modes of Operation", Proceedings of the 38th Symposium on Foundations of Computer Science, IEEE, 1997.
- Elghandour, A., Salah, A., & Karawia, A. (2021). A new cryptographic algorithm via a two-dimensional chaotic map. Ain Shams Engineering Journal.
- Chhabra, A., and Singhal, N, "Indicator-Based Cyber Threats Detection for Data of Smart Cities Using Bio-Inspired Artificial Algae Algorithm", IJARET, Vol. 11, Issue. 11, pp. 1530-1536, (2020).
- Adedeji Kazeem, B., & Akinlolu, P. (2014). A new hybrid data encryption and decryption technique to enhance data security in communication networks: algorithm development. International Journal of Scientific & Engineering Research, 5(10).
- Dodge M, Kitchin R. The challenges of cybersecurity for smart cities. InCreating Smart Cities 2019 (pp. 205-216). Routledge.
- Adedeji Kazeem B, Akinlolu P. A new hybrid data encryption and decryption technique to enhance data security in communication networks: algorithm development. International Journal of Scientific & Engineering Research. 2014 Oct;5(10).
- Butt, Talal Ashraf, and Muhammad Afzaal. "Security and privacy in smart cities: issues and current solutions." In Smart technologies and innovation for a sustainable future, pp. 317-323. Springer, Cham, 2019.
- Eckhoff David and Wanger Isabel, "Privacy in Smart Cities-Applications, Technologies, Challenges and Solutions", IEEE Communications Surveys and Tutorials, Vol. 20, Issue. 1, pp. 489-516, (2017). https://doi.org/10.1109/COMST.2017.2748998
- Elmaghraby, A. S., andLosavio, M. M., "Cyber Security Challenges in Smart Cities: Safety, security, and privacy", Journal of advanced research, Vol.5, Issue. 4,pp. 491-497, (2014). https://doi.org/10.1016/j.jare.2014.02.006
- Theodorakopoulos, G. and Baras, J. S., "Game-theoretic modeling, of malicious users in collaborative networks", IEEE Journal on selected areas in communications, Vol.26, Issue. 7,pp. 1317-1327, (2008).67. https://doi.org/10.1109/JSAC.2008.080928