Implementation of DNA cryptography in Iot using Chinese remainder theorem, arithmetic encoding, and asymmetric key cryptography

A Satpati, S Paul, P Majumder - Advances in data science and …, 2022 - taylorfrancis.com
In today's world security is an important issue where internet plays an important role.
Network security helps us by protecting our valuable data from unauthorized access, harmful …

A Survey on the security of IoT communications

CB Pattanaik, MC Trivedi… - … and Networking (CICTN), 2023 - ieeexplore.ieee.org
One of the technologies that have gained the most traction over the past ten years in a
variety of applications is the Internet of Things (IoT). For communication, processing …

Modeling of a cryptographic protocol for matching a shared secret key-permutation of significant dimension with its isomorphic representations

VG Saiko, VG Krasilenko, SS Kiporenko… - Papers of the X …, 2024 - ir.lib.vntu.edu.ua
A protocol for agreement by user parties of secret keys-permutations of significant dimension
and their new isomorphic matrix representations is proposed. Features and advantages of …

[图书][B] Cryptography-The Hidden Message

D Bhatia - 2022 - books.google.com
The current book piece is an initial step in the marvelous feat of the cryptographic area. This
is a precise concordance of renowned algorithms, with a focus on those which are assumed …

Private Blockchain-Enabled Security Framework for IoT-Based Healthcare System

S Saha, AK Das, D Giri - International Conference on Mathematics and …, 2023 - Springer
Abstract The Internet of Things (IoT)-enabled healthcare becomes one of the important
technology due to the advances in the information and communications technology (ICT) …

[HTML][HTML] Методи генерації потоку великорозмірних перестановок при їх ізоморфних представленнях матрицями

ВГ Красиленко, ДВ Нікітович - The 10th International scientific …, 2024 - books.google.com
Розглядаються та моделюються методи та процеси генерації потоку матриць
перестановок значної розмірності при їх нових ізоморфних поданнях. Обґрунтована …

[PDF][PDF] Energy Aware Clustered Blockchain Data for IoT: An End-to-End Lightweight Secure & Enroute Filtering Approach

M KUMAR - 2022 - academia.edu
Internet of things (IoT) include smart homes, smart buildings and smart factories, in which all
the devices are connected over the internet throughwireless network for data transmission or …

A review of Blockchain-based batch authentication techniques for securing the Internet of Vehicles

A Mustafa, B Syangtan, A Maag… - 2021 6th International …, 2021 - ieeexplore.ieee.org
Batch authentication technique and blockchain technology have been used for the IoV to
maintain vehicle communication and eliminate accidents. It has been specified that …

MULTI-modal Imaging of FOREnsic SciEnce Evidence: MULTI-FORESEE Project

N Sklavos, S Francese - 2020 23rd Euromicro Conference on …, 2020 - ieeexplore.ieee.org
In Digital Forensics science, face detection and recognition techniques are nowadays tightly
connected. Investigators need accurate results delivered quickly for their official reports, in …

Optimizing Security and Quality of Service for End-to-End Cryptographic Access Control in IoT Applications

S Berlato, U Morelli, R Carbone, S Ranise - Available at SSRN 4749822 - papers.ssrn.com
Abstract Internet of Things (IoT) applications generate and exchange data which are
threatened by external attackers, malicious insiders, and honest-but-curious Edge and …