Chaos and Logistic Map Based Key Generation Technique for AES-Driven IoT Security.
Ziaur RahmanXun YiIbrahim KhalilMousumi Akter SumiPublished in: QSHINE (2021)
Keyphrases
- encryption algorithm
- security problems
- encryption algorithms
- key management
- encryption decryption
- management system
- security analysis
- information security
- advanced encryption standard
- data security
- cryptographic algorithms
- logistic regression
- maximum a posteriori
- security issues
- security mechanisms
- intrusion detection
- access control
- data encryption
- secret key
- data driven
- security policies
- rfid systems
- neural network
- security systems
- block cipher
- encryption scheme
- security requirements
- big data
- high security
- computer networks
- elliptic curve cryptography
- logistic model
- cloud computing
- security protocols
- smart card
- privacy preserving
- database systems