A new authentication procedure for client-server applications using HMAC
Hash functions are used for data integrity and authentication but unfortunately they suffer
with man in the middle attack problem. An intruder who has command over the …
with man in the middle attack problem. An intruder who has command over the …
Three party key sharing protocol using polynomial rings
A Chaturvedi, V Shukla… - 2018 5th IEEE Uttar …, 2018 - ieeexplore.ieee.org
All of us know that authentication and key agreement are the two cryptographic services very
important for data communication. People use online methods for information exchange …
important for data communication. People use online methods for information exchange …
An authenticated and secure electronic health record system
Now a day's electronic health record (EHR) systems are in vogue. Many big countries like
Australia and China are implementing new secure ways to store patient's data. This data can …
Australia and China are implementing new secure ways to store patient's data. This data can …
[PDF][PDF] Secure wireless communication protocol: to avoid vulnerabilities in shared authentication
Routers are used to connect both similar and dissimilar LANs. Routers are connected to
access points. Access point provides wireless connectivity of a wired LAN. Whenever we …
access points. Access point provides wireless connectivity of a wired LAN. Whenever we …
A new encryption/decryption approach using AES
MK Misra, R Mathur, R Tripathi - 2021 5th International …, 2021 - ieeexplore.ieee.org
Information security issues are the most important concerns in the information technology
driven world. The security concern of electronic data becomes so important and the …
driven world. The security concern of electronic data becomes so important and the …
[PDF][PDF] Double layer cryptographic protocol for mobile ad-hoc networks (MANETs) by commitment scheme
In the modern world, with the ever-increasing demand of internet, the role of Cryptography
becomes vital. We use ecommerce (business to consumer or consumer to business) …
becomes vital. We use ecommerce (business to consumer or consumer to business) …
Quantum Computing: Threats & Possible Remedies
Information Security is a buzz word today. Due to the emergence and recent developments
of quantum computers, there is a possible threat on all present cryptographic methods …
of quantum computers, there is a possible threat on all present cryptographic methods …
A Secure Signature Verification Mechanism for Smooth Authentication Process
Authentication is very important for information security. The importance increases when it
comes to financial transactions. In banking scenarios, the signatures on cheques and other …
comes to financial transactions. In banking scenarios, the signatures on cheques and other …
A Secure RSA-Based Image Encryption Method
V Shukla, SN Tiwari, MA Al-Shareeda… - … Conference on Cryptology …, 2023 - Springer
Modern world moves around data communication, and its security is a key issue nowadays.
It is very unsafe to transmit images over insecure wireless communication channels. In this …
It is very unsafe to transmit images over insecure wireless communication channels. In this …
A New Data Communication Method Using RSA and Steganography Check for updates
Information exchange is an inseparable part in modern life. The security of information is a
key term. Cryptography is all about keeping data secure. Cryptography provides various …
key term. Cryptography is all about keeping data secure. Cryptography provides various …