Cryptography algorithms for enhancing IoT security
In today's fast-paced world, a new technology paradigm known as the Internet of Things
(IoT) is advancing every business. It provides communication between the digital and …
(IoT) is advancing every business. It provides communication between the digital and …
Data security techniques in cloud computing based on machine learning algorithms and cryptographic algorithms: Lightweight algorithms and genetics algorithms
Cloud computing (CC) refers to the on‐demand availability of network resources, particularly
data storage and processing power, without requiring special or direct administration by …
data storage and processing power, without requiring special or direct administration by …
[PDF][PDF] New Efficient Cryptographic Techniques For Cloud Computing Security
The exponential expansion of Cloud computing has resulted in a solution revolution within
data storage and employ, but it has also increased security concerns. Typically, traditional …
data storage and employ, but it has also increased security concerns. Typically, traditional …
[HTML][HTML] A comparative assessment of homomorphic encryption algorithms applied to biometric information
G Crihan, M Crăciun, L Dumitriu - Inventions, 2023 - mdpi.com
This paper provides preliminary research regarding the implementation and evaluation of a
hybrid mechanism of authentication based on fingerprint recognition interconnected with …
hybrid mechanism of authentication based on fingerprint recognition interconnected with …
Comprehensive Review and Analysis of Cryptography Techniques in Cloud Computing
K Sasikumar, S Nagarajan - IEEE Access, 2024 - ieeexplore.ieee.org
Cloud computing is a fast-growing industry that offers various online services, including
software, computing resources, and databases. Its payment model is usage-based, whereas …
software, computing resources, and databases. Its payment model is usage-based, whereas …
Dynamic AES Encryption and Blockchain Key Management: A Novel Solution for Cloud Data Security
In the rapidly evolving realm of cloud computing security, this paper introduces an innovative
solution to address persistent challenges. The proliferation of cloud technology has brought …
solution to address persistent challenges. The proliferation of cloud technology has brought …
A hybrid algorithm-based optimization protocol to ensure data security in the cloud
S Zubair, HMA Ahmed - International Journal of Information Technology, 2024 - Springer
Cloud computing security involves the procedures, technologies, and policies that protect
data, applications, and resources in cloud computing environments. As communities …
data, applications, and resources in cloud computing environments. As communities …
[PDF][PDF] Blood Cells Cancer Detection Based on Deep Learning
AJ Abougarair, M Alshaibi, AK Alarbish… - Journal of Advances …, 2024 - researchgate.net
Acute Lymphocytic Leukemia (ALL) is a form of cancer characterized by the abnormal
production of white blood cells in the bone marrow. These cells do not function properly …
production of white blood cells in the bone marrow. These cells do not function properly …
Recent Lightweight cryptography (LWC) based security advances for resource-constrained IoT networks
In today's world, the Internet of Things (IoT) plays a major role to interconnect all the devices
and improve the overall Quality of Life (QoL) for people. The main concern among IoT …
and improve the overall Quality of Life (QoL) for people. The main concern among IoT …
Lightweight cryptography concepts and algorithms: A survey
ZA Mohammed, KA Hussein - 2023 Second International …, 2023 - ieeexplore.ieee.org
Evolutionary technologies have been raised under the umbrella of the Internet, such as
Cloud computing, The Internet of Things (IoT), and The Internet of Everything (IoE). All these …
Cloud computing, The Internet of Things (IoT), and The Internet of Everything (IoE). All these …