Proof-of-puf enabled blockchain: Concurrent data and device security for internet-of-energy

R Asif, K Ghanem, J Irvine - Sensors, 2020 - mdpi.com
A detailed review on the technological aspects of Blockchain and Physical Unclonable
Functions (PUFs) is presented in this article. It stipulates an emerging concept of Blockchain …

Secure framework enhancing AES algorithm in cloud computing

IA Awan, M Shiraz, MU Hashmi… - Security and …, 2020 - Wiley Online Library
The tremendous growth of computational clouds has attracted and enabled intensive
computation on resource‐constrained client devices. Predominantly, smart mobiles are …

Modified advanced encryption standard algorithm for information security

OC Abikoye, AD Haruna, A Abubakar, NO Akande… - Symmetry, 2019 - mdpi.com
The wide acceptability of Advanced Encryption Standard (AES) as the most efficient of all of
the symmetric cryptographic techniques has further opened it up to more attacks. Efforts that …

[Retracted] A Secure Environment Using a New Lightweight AES Encryption Algorithm for E‐Commerce Websites

FT Abdul Hussien, AMS Rahma… - Security and …, 2021 - Wiley Online Library
Providing security for transmitted data through the e‐commerce environment requires using
a fast and high secure encryption algorithm. Balancing between the speed and the security …

Utilizing trusted lightweight ciphers to support electronic-commerce transaction cryptography

GS Shyaa, M Al-Zubaidie - Applied Sciences, 2023 - mdpi.com
Electronic-commerce (e-commerce) has become a provider of distinctive services to
individuals and companies due to the speed and flexibility of transferring orders and …

Cryptographic strength evaluation of key schedule algorithms

S Afzal, M Yousaf, H Afzal, N Alharbe… - Security and …, 2020 - Wiley Online Library
Key schedule algorithms play an important role in modern encryption algorithms, and their
security is as crucial as the security of the encryption algorithms themselves. Many studies …

Novel design of cryptosystems for video/audio streaming via dynamic synchronized chaos-based random keys

CH Lin, GH Hu, JS Chen, JJ Yan, KH Tang - Multimedia Systems, 2022 - Springer
In this paper, a novel chaos-based cryptosystem is proposed to ensure the communication
security of video/audio streaming in the network environment. Firstly, by the proposed …

A Secure Key Expansion Algorithm for Present

I Sultan, MY Lone, M Nazish… - IEEE Sensors Journal, 2023 - ieeexplore.ieee.org
The efficiency of a cryptographic algorithm in terms of security depends on the resistance
against cryptanalytic attacks. Besides the complexity of the encryption algorithm, the key …

Neural Crypto-Coding Based Approach to Enhance the Security of Images over the Untrusted Cloud Environment

P Kulkarni, R Khanai, D Torse, N Iyer, G Bindagi - Cryptography, 2023 - mdpi.com
The cloud provides on-demand, high-quality services to its users without the burden of
managing hardware and software. Though the users benefit from the remote services …

Applying Zero Trust Architecture and Probability-Based Authentication to Preserve Security and Privacy of Data in the Cloud

Y Colomb, P White, R Islam, A Alsadoon - Emerging Trends in …, 2022 - Springer
With the convenience of Cloud computing (CC) comes changes and challenges to
cybersecurity. Organisational networks have changed, and the traditional perimeter-style …