JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE) ›› 2015, Vol. 50 ›› Issue (03): 1-5.doi: 10.6040/j.issn.1671-9352.3.2014.147
ZHANG Jing1,2, XUE Leng1,2, CUI Yi3, RONG Hui4, WANG Jian-ping2
CLC Number:
[1] 孙利民,李建中,孙渝,等.无线传感器网络[M]. 北京:清华大学出版社, 2005:4-6. SUN Limin, LI Jianzhong, SUN Yu, et al. Wireless sensor network [M]. Beijing: Tsinghua University Press, 2005:4-6. [2] 杜治国,胡大辉.改进的RSA算法在无线传感器网络中的应用[J].计算机应用,2012,32(6):1609-1612. DU Zhiguo, HU Dahui. Application of improved RSA algorithm in wireless sensor network [J].Journal of Computer Applications, 2012, 32(6):1609-1612. [3] Khushdeep Kaur, Er Seema. Hybrid algorithm with DSA, RSA and MD5 encryption algorithm for wireless devices[J].International Journal of Engineering Research and Applications, 2012, 2(5):914-917. [4] SAPONARA S, SOLANAS A, AVOINE G, et al.Privacy and security in wireless sensor networks: protocols, algorithms, and efficient architectures[J].Journal of Computer Networks and Communications, 2013(2013):1-3. [5] RAJKUMAR, SUNITHA K R, CHANDRAKANTH H G. A survey on security attacks in wireless sensor network[J].International Journal of Engineering Research and Applications, 2012, 2(4):1684-1691. [6] 吴祥兴,陈忠.混沌学导论[M].上海:上海科学技术文献出版社,2001:1-6. WU Xiangxing, CHEN Zhong, Introduction to chaos theory [M]. Shanghai:Shanghai Science and Technology Press, 2001:1-6. [7] 周松华,张颖.基于一维Logistic映射的图像置乱算法研究[J].井冈山大学学报:自然科学版,2012,33(1):64-67. ZHOU Songhua, ZHANG Ying. Survey on digital image scrambling encryption algorithm [J]. Journal of Jinggangshan University: Natural Science, 2012, 33(1):64-67. [8] 任帅,高承实,戴青,等.一种对高维混沌图像加密算法的攻击方法[J].计算机工程,2011,37(4):131-133. REN Shuai, GAO Chengshi, DAI Qing, et al. Attack method to high—dimension chaotic image Encryption Algoritnm[J]. Computer Engineering, 2011, 37(4):131-133. [9] 胡春强,邓绍江,秦明甫,等.基于Logistic与标准映射的数字图像加密算法[J].计算机科学,2010,37(12):57-59. HU Chunqiang, DENG Shaojiang, QIN Mingfu, et al. Image encryption algorithm based on logistic and standard map[J]. Computer Science, 2010, 37(12):57-59. [10] DANIEL D W, ROBERT A J M. Supercomputer investigation of a chaotic encryption algorithm [J]. Cryptologia, 1991, 15(2):140-152. [11] 赵文博,田小平,吴成茂.基于信道编码和Henon映射的图像加密方法[J].西安邮电学院学报,2012,17(3):15-19. ZHAO Wenbo, TIAN Xiaoping, WU Chengmao. Image encryption combined channel coding with Henon mapping[J]. Journal of Xi'an University of Posts and Telecommunications, 2012, 17(3):15-19. [12] ULUAGAC A S, BEYAH R A, LI Yingshu, et al. VEBEK:virtual energy-based encryption and keying for wireless sensor networks[J].IEEE Transactions on Mobile Computing, 2010, 9(7):994-1007. [13] VIDAL G, BAPTISTA M S, MANCINI H. Fundamentals of a classical chaos-based cryptosystem with some quantum cryptography features [J].International Journal of Bifurcation and Chaos, 2012, 22(10):1250243.1-1250243.14. |
[1] | DING Yi-tao, YANG Hai-bin, YANG Xiao-yuan, ZHOU Tan-ping. A reversible image data hiding scheme in Homomorphic encrypted domain [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2017, 52(7): 104-110. |
[2] | KANG Hai-yan, MA Yue-lei. Survey on application of data mining via differential privacy [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2017, 52(3): 16-23. |
[3] | WU Zhi-jun,SHEN Dan-dan. Architecture and key technologies of network-enabled next generation global flight tracking based on information integration and sharing [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2016, 51(11): 1-6. |
[4] | KANG Hai-yan, YANG Kong-yu, CHEN Jian-ming. A method of personalized privacy preservation based on K-anonymization [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2014, 49(09): 142-149. |
[5] | L Jia-liang1,2,3, WANG Ying-long1,3, CUI Huan-qing1, WEI Nuo2,3, GUO Qiang2,3. Study on the node localization schemes of three dimensional wireless sensor networks based on particle swarm optimization [J]. J4, 2013, 48(05): 78-82. |
[6] | HUANG Jing-wen. uzzy group decision making for information security risk factors analysis [J]. J4, 2012, 47(11): 45-49. |
[7] | ZHOU Shu-wang1,2,3, WANG Ying-long1,3, GUO Qiang1,2, WEI Nuo1,2, GUO Wen-juan1,3. A new method for localization based on network coverage and intelligent search [J]. J4, 2010, 45(11): 27-31. |
[8] | ZHOU Shu-Wang, WANG Yang-Long, GUO Jiang, WEI Nuo. Particle swarm optimizationbasedwireless sensor network nodes localization method [J]. J4, 2009, 44(9): 52-55. |
|