2018
DOI: 10.1007/978-981-13-1540-4_3
|View full text |Cite
|
Sign up to set email alerts
|

Computational Intelligence Based Neural Session Key Generation on E-Health System for Ischemic Heart Disease Information Sharing

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
8
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
8
2

Relationship

7
3

Authors

Journals

citations
Cited by 12 publications
(8 citation statements)
references
References 8 publications
0
8
0
Order By: Relevance
“…Kinzel and Kanter [15] and Ruttor et al [16] identified that if the weight of the network increases, the attack probability decreases and the assailant's computational cost grows exponentially as the user effort becomes polynomial. Sarkar and Mandal [17] and Sarkar et al [18]- [21] proposed schemes to enhance the security of the protocol by improving the synaptic depths of TPM and henceforth counteracting the attacks of the brute strength of the attacker. It is found that the amount of security provided by TPM synchronization can also be improved by inserting a large collection of neurons and entries of each neuron into the hidden layers.…”
Section: Related Workmentioning
confidence: 99%
“…Kinzel and Kanter [15] and Ruttor et al [16] identified that if the weight of the network increases, the attack probability decreases and the assailant's computational cost grows exponentially as the user effort becomes polynomial. Sarkar and Mandal [17] and Sarkar et al [18]- [21] proposed schemes to enhance the security of the protocol by improving the synaptic depths of TPM and henceforth counteracting the attacks of the brute strength of the attacker. It is found that the amount of security provided by TPM synchronization can also be improved by inserting a large collection of neurons and entries of each neuron into the hidden layers.…”
Section: Related Workmentioning
confidence: 99%
“…Efficient management of key space makes the brute force attack [45] infeasible. In this attack, attacker tries to translate the cipher text into plain text using every possible key.…”
Section: Brute Force Attacksmentioning
confidence: 99%
“…Kinzel and Kanter [26] and Ruttor et al [42] described that a chance of an attack is declining if the network's weight range get increases and the assailant's calculation cost increases, as its effort increases exponentially, as users' effort becomes polynomial. Sarkar and Mandal [44], Sarkar et al [48], Sarkar et al [46], Sarkar and Mandal [45], Sarkar et al [47] proposed schemes which enhanced the security of the protocol by enhancing the synaptic depths of TPM and henceforth counteracting the attacks of the brute power of the attacker. It is found that the amount of security provided by the TPM synchronization also can be improved by introducing a large set of neurons and entries of each neuron in the hidden layers.…”
Section: Related Workmentioning
confidence: 99%