Figure 1. Public-key cryptography or asymmetric cryptography
Figure 2. Hash chain Block Diagram
Figure 4. An Efficient Multi-Layer Encryption Framework with Authentication
Figure 3. Block Elements
Table 1. Hash Function Property used in cryptography.
Table 2. Hash / MAC / Digital Signature - Security Goals.
참고문헌
- K. Zheng, M. Li, and H. Jiang (Eds.), Honeybee: A Programming Framework for Mobile Crowd Computing MOBIQUITOUS", 2013, LNICST 120, pp. 224-236, 2013.
- Ivan Stojmenovic, ": Mobile Cloud and Green Computing", Procedia Computer Science,2012.
- M. Somasundaram, S.Gitanjali, T.C.Govardhani, G. Lakshmi Priya and R. Sivakumar, "Medical Image Data Management System in Mobile Cloud Computing Environment", IPCSIT, 2011.
- Derek G. Murray, Eiko Yoneki Jon, Crowcroft Steven Hand, "The Case for Crowd Computing", MobiHeld 2010.
- Cheng Ye, Joseph Coco, Anna Epishova, Chen Hajaj, Henry Bogardus, Laurie Novak, Joshua Denny, Yevgeniy Vorobeychik, Thomas Lasko, Bradley Malin, Daniel Fabbri, "A Crowdsourcing Framework for Medical Data Sets", Vanderbilt University, Nashville, TN, US
- Imdat As, Maria Angelico, "CROWDSOURCING ARCHITECTURE: A DISRUPTIVE MODEL IN ARCHITECTURAL PRACTICE", University of Hartfor
- Kerri Wazny, "Applications of crowdsourcing in health: an overview", global journal of health.
- Towards Smart Healthcare: Patient Data Privacy and Security in Sensor-Cloud Infrastructure Isma Masood, 1 YongliWang,1 AliDaud,2 NaifRadiAljohani,3 and Hassan Dawood4 Hindawi Wireless Communications and Mobile Computing Volume 2018, Article ID 2143897, 23 pages
- Ahmad Habboush, Multi-Level Encryption Framework (IJACSA) International Journal of Advanced Computer Science and Applications, I Page -130, Vol. 9, No. 4, 2018.
- Medical Image Encryption: An Application for Improved Padding Based GGH Encryption Algorithm Massoud Sokouti1, Ali Zakerolhosseini2 and Babak Sokouti3, * -- Article in The Open Medical Informatics Journal. 2016
- Dual Authentication-Based Encryption with a Delegation System to Protect Medical Data in Cloud Computing Aymen Mudheher Badr 1, Yi Zhang 1 and Hafiz Gulfam Ahmad Umar 2, -- MDPI 2019.
- International Conference on Medical Imaging Understanding and Analysis 2016, Loughborough, UK--Security of multi-frame DICOM images using XOR encryption approach Q. N. Natsheh*, B. Li, A. G. Gale.
- A Survey about Consensus Algorithms Used in Blockchain- Giang-Truong Nguyen* and Kyungbaek Kim Inf Process Syst, Vol.14, No.1, pp.101-128, February 2018 ISSN 1976-913X (Print).
- DIP Using Image Encryption and XOR Operation Affine Transform Anurag Singh1, Dr. Namrata Dhanda 2 -(IOSR-JCE) e-ISSN: 2278-0661, p-ISSN: 2278-8727, Volume 17, Issue 2, Ver. V (Mar -Apr. 2015), PP 07-15
- Dirk Rijmenants, Secure Communications with the One Time Pad Cipher Version 6.2, 18 December 2014.
- One-time password based on hash chain without shared secret and re-registration- Chang-Seop Park Elsevier - 19 February 2018 Available online 28 February 2018.