Preserving data confidentiality in Internet of Things

PM Chanal, MS Kakkasageri - SN Computer Science, 2021 - Springer
Abstract The Internet of Things (IoT) is a network of linked physical objects worldwide,
communicating via the Internet to one another. IoT expects the interconnection between a …

Time Efficient Hash Key Generation For Blockchain Enabled Framework

SK Sinha, D Mukhopadhyay - IEEE Access, 2024 - ieeexplore.ieee.org
Blockchain, in general, helps organizations to improve the transparency and governance by
removing its shortfalls and building better control overall. Blockchain network, public or …

Hybrid Multiple Cryptography for Data Encryption

M Anuradha, S Loganathan, G Suseela… - 2023 8th …, 2023 - ieeexplore.ieee.org
Since the information technology revolution, cryptography has been essential for protecting
sensitive information and communication. A plethora of algorithms have been developed to …

[PDF][PDF] Hybrid Dynamic Optimization forMultilevel Security System in Disseminating Confidential Information.

S Anwarul, S Kumar, A Bhansali… - … Systems Science & …, 2023 - cdn.techscience.cn
Security systems are the need of the hour to protect data from unauthorized access. The
dissemination of confidential information over the public network requires a high level of …

A hybrid encryption algorithm for security enhancement of wireless sensor networks: A supervisory approach to pipelines

OE Mahdi Ebadati, F Eshghi… - Computer Modeling in …, 2020 - ingentaconnect.com
Transmission pipelines are vulnerable to various accidents and acts of vandalism.
Therefore, a reliable monitoring system is needed to secure the transmission pipelines. A …

Security enhancement using modified AES and Diffie–Hellman key exchange

Y Bhavani, B Jaya Krishna - Advances in Computational Intelligence and …, 2021 - Springer
In today's world, providing data security is a primary concern. For this purpose, many
researchers have introduced asymmetric and symmetric algorithms to ensure security. But …

Blockchain-Based Secure File Storage with Hybrid Cryptography and Machine Learning for Malware Detection

AM Ali, V Ghorpade, N Pathak, N Sharma - Advances in Information …, 2022 - Springer
Storing your data on hosted servers is made possible through cloud storage. With each
organization using the cloud to save their data, there is a significant risk of data misuse. For …

Enhancing the RSA algorithm using DH principles towards CIA compliance

A Benhura, C Chibaya - 2021 3rd International …, 2021 - ieeexplore.ieee.org
Security remains a major concern in networks and internet communication. Incidents of
cyber-attacks are still increasing. Data needs to be protected from these cyber-attacks …