[1] Ning, H., Liu, H., Ma, J., Yang, L. T., & Huang, R.. Cybermatics: Cyber–physical–social–thinking hyperspace based science and technology. Future generation computer systems, 56, (2016) 504-522.
[2] Amor, A. B., Abid, M., & Medb, A. Secure blockchain-based e-learning scheme. IEEE Access, 8, (2020) 31920-31933.
[3] Ding, S., Li, C., & Li, H. A novel efficient pairing-free CP-ABE based on elliptic curve cryptography for IoT. IEEE Access, 6, (2018) 27336-27345.
[4] Zhang, Y., Li, J., & Yan, H. Constant size ciphertext distributed CP-ABE scheme with privacy protection and fully hiding access structure. IEEE Access, 7, (2019) 47982-47990.
[5] Ning, J., Cao, Z., Dong, X., & Wei, L. White-box traceable CP-ABE for cloud storage service: how to catch people leaking their access credentials effectively. IEEE Transactions on Dependable and Secure Computing, 15(5), (2016) 883-897.
[6] Chuman, T., Sirichotedumrong, W., & Kiya, H.
Encryption-then-compression systems using grayscale-based image encryption for jpeg images. IEEE Transactions on Information Forensics and security, 14(6), (2018)1515-1525. Available:
https://ieeexplore.ieee.org/document/8537968
[8] Ghadirli, H. M., Nodehi, A., & Enayatifar, R. An overview of encryption algorithms in color images. Signal Processing, 164, (2019)163-185.
[9] Farah, M. B., Farah, A., & Farah, T. An image encryption scheme based on a new hybrid chaotic map and optimized substitution box. Nonlinear Dynamics, (2019) 1-24.
[10] Khan, P. W., & Byun, Y. A blockchain-based secure image encryption scheme for the industrial Internet of Things. Entropy, 22(2), (2020) 175.
[11] Mondal, B., Kumar, P., & Singh, S. A chaotic permutation and diffusion based image encryption algorithm for secure communications. Multimedia Tools and Applications, 77(23), (2018) 31177-31198.
[12] Chowdhary, C. L., Patel, P. V., Kathrotia, K. J., Attique, M., Perumal, K., & Ijaz, M. F. Analytical study of hybrid techniques for image encryption and decryption. Sensors, 20(18), (2020) 5162.
[13] Wang, J., Zhi, X., Chai, X., & Lu, Y. Chaos-based image encryption strategy based on random number embedding and DNA-level self-adaptive permutation and diffusion. Multimedia Tools and Applications, 1-36. (2021)
[14] Bashier, E., & Jabeur, T. B. An Efficient Secure Image Encryption Algorithm Based on Total Shuffling, Integer Chaotic Maps and Median Filter (No. 5028). (2021) EasyChair.
[15] Zhang, L., Liang, P., & Mu, Y. Improving privacy-preserving and security for decentralized key-policy attributed-based encryption. IEEE Access, 6, (2018) 12736-12745.
[17] Ismail, S. M., Said, L. A., Radwan, A. G., Madian, A. H., & Abu-ElYazeed, M. F. A novel image encryption system merging fractional-order edge detection and generalized chaotic maps. Signal Processing, 167, (2020) 107280.
[18] Ahmad, M., Al Solami, E., Wang, X. Y., Doja, M. N., Beg, M. M., & Alzaidi, A. Cryptanalysis of an image encryption algorithm based on combined chaos for a BAN system, and improved scheme using SHA-512 and hyperchaos. Symmetry, 10(7), (2018) 266.
[19] Yahyazadeh , Z.Hashempour , Effect of Hydrostatic Pressure on Optical Absorption Coefficient of InGaN/GaN of Multiple Quantum Well Solar Cells , (Spring 2021). Vol. 6, No. 2.
[20] M. Mohammadi , A.Zolghadr , M. Pourmina , Comparison of two Public Key Cryptosystems, Summer 2018 / Vol. 3, No. 3.
[21] M.Momeni , M Javadian Sarraf , F.Khatib ,Design of high sensitivity and high FoM refractive index biosensor based on 2D-photonic crystal, Winter 2021 / Vol. 6, No. 1.
[22] M.Rajaee, S. Rabiee , Analysis and Implementation of a New Method to Increase the Efficiency of Photovoltaic Cells by Applying a Dual Axis Sun Tracking System and Fresnel Lens Array, Summer 2021 / Vol. 6, No. 3.
[23] Sh.Shahi, P. Momayezan , M. Ranjbaran, S. Wadi Harun, Observation of Raman Gain in Reduced Length of Bismuth Erbium Doped Fiber, Summer 2020 / Vol. 5, No. 3.
[24] Wang, Q., Peng, L., Xiong, H., Sun, J., & Qin, Z. Ciphertext-policy attribute-based encryption with delegated equality test in cloud computing. IEEE Access, 6, (2017) 760-771.
[25] Alrawais, A., Alhothaily, A., Hu, C., & Cheng, X. Blockchain computing for the internet of things: Security and privacy issues. IEEE Internet Computing, 21(2), (2017) 34-42.