Cryptography algorithms for enhancing IoT security

F Thabit, O Can, AO Aljahdali, GH Al-Gaphari… - Internet of Things, 2023 - Elsevier
In today's fast-paced world, a new technology paradigm known as the Internet of Things
(IoT) is advancing every business. It provides communication between the digital and …

Data security techniques in cloud computing based on machine learning algorithms and cryptographic algorithms: Lightweight algorithms and genetics algorithms

F Thabit, O Can, RUZ Wani, MA Qasem… - Concurrency and …, 2023 - Wiley Online Library
Cloud computing (CC) refers to the on‐demand availability of network resources, particularly
data storage and processing power, without requiring special or direct administration by …

[PDF][PDF] New Efficient Cryptographic Techniques For Cloud Computing Security

M Kaleem, MA Mushtaq, U Jamil, SA Ramay… - Migration …, 2024 - researchgate.net
The exponential expansion of Cloud computing has resulted in a solution revolution within
data storage and employ, but it has also increased security concerns. Typically, traditional …

[HTML][HTML] A comparative assessment of homomorphic encryption algorithms applied to biometric information

G Crihan, M Crăciun, L Dumitriu - Inventions, 2023 - mdpi.com
This paper provides preliminary research regarding the implementation and evaluation of a
hybrid mechanism of authentication based on fingerprint recognition interconnected with …

Comprehensive Review and Analysis of Cryptography Techniques in Cloud Computing

K Sasikumar, S Nagarajan - IEEE Access, 2024 - ieeexplore.ieee.org
Cloud computing is a fast-growing industry that offers various online services, including
software, computing resources, and databases. Its payment model is usage-based, whereas …

Dynamic AES Encryption and Blockchain Key Management: A Novel Solution for Cloud Data Security

MY Shakor, MI Khaleel, M Safran, S Alfarhood… - IEEE …, 2024 - ieeexplore.ieee.org
In the rapidly evolving realm of cloud computing security, this paper introduces an innovative
solution to address persistent challenges. The proliferation of cloud technology has brought …

A hybrid algorithm-based optimization protocol to ensure data security in the cloud

S Zubair, HMA Ahmed - International Journal of Information Technology, 2024 - Springer
Cloud computing security involves the procedures, technologies, and policies that protect
data, applications, and resources in cloud computing environments. As communities …

[PDF][PDF] Blood Cells Cancer Detection Based on Deep Learning

AJ Abougarair, M Alshaibi, AK Alarbish… - Journal of Advances …, 2024 - researchgate.net
Acute Lymphocytic Leukemia (ALL) is a form of cancer characterized by the abnormal
production of white blood cells in the bone marrow. These cells do not function properly …

Recent Lightweight cryptography (LWC) based security advances for resource-constrained IoT networks

S Pandey, B Bhushan - Wireless Networks, 2024 - Springer
In today's world, the Internet of Things (IoT) plays a major role to interconnect all the devices
and improve the overall Quality of Life (QoL) for people. The main concern among IoT …

Lightweight cryptography concepts and algorithms: A survey

ZA Mohammed, KA Hussein - 2023 Second International …, 2023 - ieeexplore.ieee.org
Evolutionary technologies have been raised under the umbrella of the Internet, such as
Cloud computing, The Internet of Things (IoT), and The Internet of Everything (IoE). All these …