A comprehensive survey of cryptography key management systems

S Rana, FK Parast, B Kelly, Y Wang, KB Kent - Journal of Information …, 2023 - Elsevier
Cryptographic methods have been extensively employed in various systems to address
security objectives, such as data confidentiality, authentication, and secure communication …

Integrating blockchain and ZK-ROLLUP for efficient healthcare data privacy protection system via IPFS

S Ma, X Zhang - Scientific Reports, 2024 - nature.com
With the rapid development of modern medical technology and the dramatic increase in the
amount of medical data, traditional centralized medical information management is facing …

LURK-T: Limited Use of Remote Keys with Added Trust in TLS 1.3

B Shobiri, S Pourali, D Migault… - … on Network Science …, 2024 - ieeexplore.ieee.org
In many web applications, such as Content Delivery Networks (CDNs), TLS credentials are
shared, eg, between the website's TLS origin server and the CDN's edge servers, which can …

[PDF][PDF] Implementation of Standard Symmetric Algorithms for Data Encryption: Systematic Review

Y Granados, A Vicente, VL Alata Linares… - laccei.org
Summary—With the advancement of technology, ways to compromise information security
continue to be the Achilles heel for many web ventures. This article analyzes the symmetric …