Advances and vulnerabilities in modern cryptographic techniques: A comprehensive survey on cybersecurity in the domain of machine/deep learning and quantum …
In the contemporary landscape, where a huge amount of data plays a vital role, the
importance of strong and robust cybersecurity measures has become increasingly …
importance of strong and robust cybersecurity measures has become increasingly …
Comprehensive study of symmetric key and asymmetric key encryption algorithms
MB Yassein, S Aljawarneh… - … on engineering and …, 2017 - ieeexplore.ieee.org
Cloud computing emerged in the last years to handle systems with large-scale services
sharing between vast numbers of users. It provides enormous storage for data and …
sharing between vast numbers of users. It provides enormous storage for data and …
[PDF][PDF] DES, AES and Blowfish: Symmetric key cryptography algorithms simulation based performance analysis
Security is the most challenging aspects in the internet and network applications. Internet
and networks applications are growing very fast, so the importance and the value of the …
and networks applications are growing very fast, so the importance and the value of the …
On the economic impact of crypto-ransomware attacks: The state of the art on enterprise systems
A Zimba, M Chishimba - European Journal for Security Research, 2019 - Springer
Abstract According to Cybersecurity Ventures research in 2017, in every 40 s, a business
falls prey to a ransomware attack and the rate is predicted to rise to 14 s by 2019. Business …
falls prey to a ransomware attack and the rate is predicted to rise to 14 s by 2019. Business …
[PDF][PDF] A survey on the cryptographic encryption algorithms
Security is the major concern when the sensitive information is stored and transferred across
the internet where the information is no longer protected by physical boundaries …
the internet where the information is no longer protected by physical boundaries …
A resource-efficient encryption algorithm for multimedia big data
S Aljawarneh, MB Yassein, WA Talafha - Multimedia Tools and …, 2017 - Springer
Nowadays, multimedia is considered to be the biggest big data as it dominates the traffic in
the Internet and mobile phones. Currently symmetric encryption algorithms are used in IoT …
the Internet and mobile phones. Currently symmetric encryption algorithms are used in IoT …
A survey of cryptographic algorithms with deep learning
JYI Al-Zamily, SB Ariffin, SSM Abu Naser - AIP Conference …, 2023 - pubs.aip.org
In multimedia content, text play major role for transmission and it is crucial to protect text data
while transmitting over network. This can be achieved by text encryption algorithm. However …
while transmitting over network. This can be achieved by text encryption algorithm. However …
Performance evaluation of various symmetric encryption algorithms
S Kansal, M Mittal - … conference on parallel, distributed and grid …, 2014 - ieeexplore.ieee.org
With rise in the use of internet in various fields like banking, military and government sector,
the security and privacy of the data has been the main concern. Today, most of the data …
the security and privacy of the data has been the main concern. Today, most of the data …
Hybrid encryption framework for securing big data storage in multi-cloud environment
G Viswanath, PV Krishna - Evolutionary Intelligence, 2021 - Springer
In the present scenario, big data is facing many challenges regarding the data storage, data
theft and unauthorized access. Many researchers are concentrated on developing the …
theft and unauthorized access. Many researchers are concentrated on developing the …
A multithreaded programming approach for multimedia big data: encryption system
S Aljawarneh, MB Yassein, WA Talafha - Multimedia Tools and …, 2018 - Springer
Multimedia is currently seen to dominate the internet network and the mobile network traffic;
hence, it is seen as the largest Big data. Generally, the symmetric encryption algorithms are …
hence, it is seen as the largest Big data. Generally, the symmetric encryption algorithms are …