Preserving data confidentiality in Internet of Things
PM Chanal, MS Kakkasageri - SN Computer Science, 2021 - Springer
Abstract The Internet of Things (IoT) is a network of linked physical objects worldwide,
communicating via the Internet to one another. IoT expects the interconnection between a …
communicating via the Internet to one another. IoT expects the interconnection between a …
Time Efficient Hash Key Generation For Blockchain Enabled Framework
SK Sinha, D Mukhopadhyay - IEEE Access, 2024 - ieeexplore.ieee.org
Blockchain, in general, helps organizations to improve the transparency and governance by
removing its shortfalls and building better control overall. Blockchain network, public or …
removing its shortfalls and building better control overall. Blockchain network, public or …
Hybrid Multiple Cryptography for Data Encryption
Since the information technology revolution, cryptography has been essential for protecting
sensitive information and communication. A plethora of algorithms have been developed to …
sensitive information and communication. A plethora of algorithms have been developed to …
[PDF][PDF] Hybrid Dynamic Optimization forMultilevel Security System in Disseminating Confidential Information.
Security systems are the need of the hour to protect data from unauthorized access. The
dissemination of confidential information over the public network requires a high level of …
dissemination of confidential information over the public network requires a high level of …
A hybrid encryption algorithm for security enhancement of wireless sensor networks: A supervisory approach to pipelines
OE Mahdi Ebadati, F Eshghi… - Computer Modeling in …, 2020 - ingentaconnect.com
Transmission pipelines are vulnerable to various accidents and acts of vandalism.
Therefore, a reliable monitoring system is needed to secure the transmission pipelines. A …
Therefore, a reliable monitoring system is needed to secure the transmission pipelines. A …
Security enhancement using modified AES and Diffie–Hellman key exchange
Y Bhavani, B Jaya Krishna - Advances in Computational Intelligence and …, 2021 - Springer
In today's world, providing data security is a primary concern. For this purpose, many
researchers have introduced asymmetric and symmetric algorithms to ensure security. But …
researchers have introduced asymmetric and symmetric algorithms to ensure security. But …
Blockchain-Based Secure File Storage with Hybrid Cryptography and Machine Learning for Malware Detection
AM Ali, V Ghorpade, N Pathak, N Sharma - Advances in Information …, 2022 - Springer
Storing your data on hosted servers is made possible through cloud storage. With each
organization using the cloud to save their data, there is a significant risk of data misuse. For …
organization using the cloud to save their data, there is a significant risk of data misuse. For …
Enhancing the RSA algorithm using DH principles towards CIA compliance
A Benhura, C Chibaya - 2021 3rd International …, 2021 - ieeexplore.ieee.org
Security remains a major concern in networks and internet communication. Incidents of
cyber-attacks are still increasing. Data needs to be protected from these cyber-attacks …
cyber-attacks are still increasing. Data needs to be protected from these cyber-attacks …