[HTML][HTML] Survey on public key cryptography scheme for securing data in cloud computing
J Athena, V Sumathy - Circuits and Systems, 2017 - scirp.org
Numerous advancements in the Information Technology (IT) require the proper security
policy for the data storage and transfer among the cloud. With the increase in size of the …
policy for the data storage and transfer among the cloud. With the increase in size of the …
A bit commitment signcryption protocol for wireless transport layer security (wtls)
V Shukla, N Srivastava… - 2016 IEEE Uttar Pradesh …, 2016 - ieeexplore.ieee.org
Signcryption is comparatively new approach in public key cryptography. Signcryption has
the virtue to provide the services of digital signature and public key encryption in a single …
the virtue to provide the services of digital signature and public key encryption in a single …
[PDF][PDF] Secure wireless communication protocol: to avoid vulnerabilities in shared authentication
Routers are used to connect both similar and dissimilar LANs. Routers are connected to
access points. Access point provides wireless connectivity of a wired LAN. Whenever we …
access points. Access point provides wireless connectivity of a wired LAN. Whenever we …
A new encryption/decryption approach using AES
MK Misra, R Mathur, R Tripathi - 2021 5th International …, 2021 - ieeexplore.ieee.org
Information security issues are the most important concerns in the information technology
driven world. The security concern of electronic data becomes so important and the …
driven world. The security concern of electronic data becomes so important and the …
Cryptography: Classical versus Post-Quantum
A Awasthi, A Chaturvedi - arXiv preprint arXiv:2402.10988, 2024 - arxiv.org
The advantages of post-quantum cryptography over classical cryptography are covered in
this survey. We address several post-quantum cryptography techniques. We conclude that …
this survey. We address several post-quantum cryptography techniques. We conclude that …
[PDF][PDF] Double layer cryptographic protocol for mobile ad-hoc networks (MANETs) by commitment scheme
In the modern world, with the ever-increasing demand of internet, the role of Cryptography
becomes vital. We use ecommerce (business to consumer or consumer to business) …
becomes vital. We use ecommerce (business to consumer or consumer to business) …
[PDF][PDF] Lightweight blockchain fuzzy decision scheme through MQTT and Fibonacci for sustainable transport
Z Yang, Y Bao, Y Liu, Q Zhao, H Zheng, W Xu - Math. Biosci. Eng, 2022 - aimspress.com
The unprecedented progress in field of IoT enabled rapid developments in the vehicle
intelligent transportation systems and most of these provide services in a centralized way …
intelligent transportation systems and most of these provide services in a centralized way …
Quantum Computing: Threats & Possible Remedies
Information Security is a buzz word today. Due to the emergence and recent developments
of quantum computers, there is a possible threat on all present cryptographic methods …
of quantum computers, there is a possible threat on all present cryptographic methods …
Post-Quantum Cryptography
A Chaturvedi - arXiv preprint arXiv:2402.10576, 2024 - arxiv.org
In this survey we propose to cover the prose of post-quantum cryptography over classical
cryptography. We talk about the various cryptographic methods that are being practiced to …
cryptography. We talk about the various cryptographic methods that are being practiced to …
A Secure Signature Verification Mechanism for Smooth Authentication Process
Authentication is very important for information security. The importance increases when it
comes to financial transactions. In banking scenarios, the signatures on cheques and other …
comes to financial transactions. In banking scenarios, the signatures on cheques and other …