@incollection{, 503FBAADC5FAAABE9ACDF84AB66F53D6 10.1016/j.jnca.2017.02.009 , author={{Dr. G V N K VSubbarao} and {Keshav Memorial Institute of Technology}}, journal={{Global Journal of Computer Science and Technology}}, journal={{GJCST}}0975-41720975-435010.34257/gjcst, address={Cambridge, United States}, publisher={Global Journals Organisation}191914 } @incollection{b0, , title={{Stankovic: Denial of Service in Sensor Networks}} , author={{ ADWood } and { JA }} 10.1109/MC.2002.1039518 , journal={{Computer}} 35 10 , year={Oct. 2002} } @incollection{b1, , author={{ MAFerrag } and { LAMaglaras } and { HJanicke } and { JJiang }} , booktitle={{Authentication Protocols for Internet of Things: A Comprehensive Survey}} , year={Dec. 2016} } @incollection{b2, , author={{ THeer } and { OGarcia-Morchon } and { RHummen } and { SLKeoh } and { SSKumar } and { KlausWehrle }} 10.1007/s11277-011-0385-5 , booktitle={{Security Challenges in the IP-based Internet of Things}} , year={Dec. 2011} 61 } @incollection{b3, , booktitle={{Article Current research on Internet of Things (IoT) security: A survey 7. Akbar Abbasi "Desirable Security for WSN}} , year={august,2009} 1 } @incollection{b4, , title={{EC-DSA: An Enhanced DSA}} , author={{ AJMenezes } and { DBJohnson }} , booktitle={{Invited Talks -7th Usenix Sec., Symp}} , year={Jan., 1998} , note={Certicom Corp.} } @book{b5, , title={{A silverberg "homomorphic encryption plan for cloud services}} , year={2013} } @incollection{b6, , title={{How to Protect iot Systems and Devices IoT security features vary depending on specific IoT application and place in the IoT ecosystem. So that IoT companies from product makers to semiconductor manufactures should concentrate on building security from the beginning, making hardware tamper proof, planning secure hardware, ensuring secure upgrades, 13. Bruce schneier}} , author={{ Xii }} , journal={{Applied cryptography -Protocols}} , year={2011} , note={Algorithms. and Source Code in C" Second Edition} } @incollection{b7, , title={{A survey of homomorphic encryption for no nspecialists}} , author={{ CFontaine } and { FGaland }} , journal={{EURASIP Journal on Information Security}} , year={January 2007} } @book{b8, , author={{ CNegus }} , title={{Linux Bible: Boot Up to Fedora, KNOPPIX, Debian, SUSE, Ubuntu, and 7 Other Distributions}} , year={2006} } @incollection{b9, , title={{Research Article Oblivious Neural Network Computing via Homomorphic Encryption}} , author={{ COrlandi } and { APiva } and { Barni }} 10.1155/2007/37343 , journal={{EURASIP Journal on Information Security}} 11 , year={2007} , publisher={Hindawi Publishing Corporation} } @incollection{b10, , title={{Communication theory of secrecy systems}} , author={{ CShannon }} , journal={{Bell System Technical Journal}} 28 , year={1949} } @book{b11, , author={{ CarlosDe } and { Cordeiro }} , title={{Dharma praksh Agarwal "Ad Hoc & Sensor Networks" Theory and Applications -Worlds Scoentific}} 2012 } @book{b12, , title={{Remarks on the Security of the ECC systems}} , author={{ CerticomCorp }} , year={uly 2000} , publisher={ECC White Papers} } @book{b13, , title={{Computer and Network Security Volume 3 Security in Ad Hoc and Sensor Networks}} , author={{ CheritaCorbett } and { RaheemBeyah } and { JaniseMcnair }} , year={2011} } @book{b14, , title={{Security Services IN Group Communications OVER Wireless 22. Infrastructure, Mobile Ad Hoc, AND Wireless Sensor Networks}} , author={{ DIntegrity } and { PSakarindr } and { NAnsari }} , year={2007} , publisher={IEEE Wireless Communications} 9 } @book{b15, , title={{Post-Quantum Cryptography, chapter Lattice-based Cryptography}} , author={{ DMicciancio } and { ORegev }} , year={2008} , publisher={Springer} } @incollection{b16, , title={{Secure and Trusted in-network Data Processing in Wireless Sensor Networks: a Survey}} , author={{ AlessandroSorniotti } and { LaurentGomez } and { KonradWrona } and { LorenzoOdorico }} , journal={{Journal of Information Assurance and Security}} 2 , year={2007} } @book{b17, , title={{On Private Scalar Product Computation for Privacy -Preserving Data Mining}} , author={{ BartGoethals } and { SvenLaur } and { HelgerLipmaa } and { TaneliMielik¨ainen }} , year={2011} , address={Finland} Helsinki University of Technology } @incollection{b18, , title={{On Homomorphic Encryption and Chosen-Cipher text Security}} , author={{ BrettHemenawy } and { RafailOstrovsky }} , booktitle={{the Proceedings of PKc}} , year={2012} , note={University of Michigan} }