2021
DOI: 10.1109/tetc.2019.2943524
|View full text |Cite
|
Sign up to set email alerts
|

Secure Data Sequence Query Framework Based on Multiple Fogs

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
5

Citation Types

0
10
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
10

Relationship

1
9

Authors

Journals

citations
Cited by 21 publications
(10 citation statements)
references
References 34 publications
0
10
0
Order By: Relevance
“…With the development of communication technology and the coming of information age, people are more and more aware of the important role of information security [71][72][73][74][75][76], and the research of various security protection has become the current research hotspot [77][78][79][80][81][82]. As an important part of information security transmission, random number generator (RNG) has been paid more and more attention.…”
Section: Introductionmentioning
confidence: 99%
“…With the development of communication technology and the coming of information age, people are more and more aware of the important role of information security [71][72][73][74][75][76], and the research of various security protection has become the current research hotspot [77][78][79][80][81][82]. As an important part of information security transmission, random number generator (RNG) has been paid more and more attention.…”
Section: Introductionmentioning
confidence: 99%
“…With the application of network information technology, people attach great importance to the security and confidentiality of information [54][55][56][57][58][59][60][61][62][63][64][65][66]. Researchers are constantly looking for new methods of confidentiality [54][55][56][57][58][59][60][61][62][63][64][65][66]. Secure communication and chaotic encryption based on chaotic synchronization have become one of the research hotspots in the field of information security in recent years.…”
Section: Introductionmentioning
confidence: 99%
“…With the rapid development of computer technology, the accompanying information security issues have attracted more and more attention and become a hot issue [32][33][34][35][36][37][38][39][40][41][42]. Chaos is widely used in cryptosystems, random numbers, and secure communications [43][44][45][46][47][48][49], and it has become a hot topic in nonlinear circuits and systems.…”
Section: Introductionmentioning
confidence: 99%