Proof-of-puf enabled blockchain: Concurrent data and device security for internet-of-energy
A detailed review on the technological aspects of Blockchain and Physical Unclonable
Functions (PUFs) is presented in this article. It stipulates an emerging concept of Blockchain …
Functions (PUFs) is presented in this article. It stipulates an emerging concept of Blockchain …
Secure framework enhancing AES algorithm in cloud computing
The tremendous growth of computational clouds has attracted and enabled intensive
computation on resource‐constrained client devices. Predominantly, smart mobiles are …
computation on resource‐constrained client devices. Predominantly, smart mobiles are …
Modified advanced encryption standard algorithm for information security
The wide acceptability of Advanced Encryption Standard (AES) as the most efficient of all of
the symmetric cryptographic techniques has further opened it up to more attacks. Efforts that …
the symmetric cryptographic techniques has further opened it up to more attacks. Efforts that …
[Retracted] A Secure Environment Using a New Lightweight AES Encryption Algorithm for E‐Commerce Websites
FT Abdul Hussien, AMS Rahma… - Security and …, 2021 - Wiley Online Library
Providing security for transmitted data through the e‐commerce environment requires using
a fast and high secure encryption algorithm. Balancing between the speed and the security …
a fast and high secure encryption algorithm. Balancing between the speed and the security …
Utilizing trusted lightweight ciphers to support electronic-commerce transaction cryptography
GS Shyaa, M Al-Zubaidie - Applied Sciences, 2023 - mdpi.com
Electronic-commerce (e-commerce) has become a provider of distinctive services to
individuals and companies due to the speed and flexibility of transferring orders and …
individuals and companies due to the speed and flexibility of transferring orders and …
Cryptographic strength evaluation of key schedule algorithms
Key schedule algorithms play an important role in modern encryption algorithms, and their
security is as crucial as the security of the encryption algorithms themselves. Many studies …
security is as crucial as the security of the encryption algorithms themselves. Many studies …
Novel design of cryptosystems for video/audio streaming via dynamic synchronized chaos-based random keys
CH Lin, GH Hu, JS Chen, JJ Yan, KH Tang - Multimedia Systems, 2022 - Springer
In this paper, a novel chaos-based cryptosystem is proposed to ensure the communication
security of video/audio streaming in the network environment. Firstly, by the proposed …
security of video/audio streaming in the network environment. Firstly, by the proposed …
A Secure Key Expansion Algorithm for Present
The efficiency of a cryptographic algorithm in terms of security depends on the resistance
against cryptanalytic attacks. Besides the complexity of the encryption algorithm, the key …
against cryptanalytic attacks. Besides the complexity of the encryption algorithm, the key …
Neural Crypto-Coding Based Approach to Enhance the Security of Images over the Untrusted Cloud Environment
The cloud provides on-demand, high-quality services to its users without the burden of
managing hardware and software. Though the users benefit from the remote services …
managing hardware and software. Though the users benefit from the remote services …
Applying Zero Trust Architecture and Probability-Based Authentication to Preserve Security and Privacy of Data in the Cloud
Y Colomb, P White, R Islam, A Alsadoon - Emerging Trends in …, 2022 - Springer
With the convenience of Cloud computing (CC) comes changes and challenges to
cybersecurity. Organisational networks have changed, and the traditional perimeter-style …
cybersecurity. Organisational networks have changed, and the traditional perimeter-style …