Exploring Encryption Algorithms and Network Protocols: A Comprehensive Survey of Threats and Vulnerabilities

J Ahn, R Hussain, K Kang, J Son - … Communications Surveys & …, 2025 - ieeexplore.ieee.org
Cryptographic network protocols play a crucial role in enabling secure data exchange over
insecure media in modern network environments. However, even minor vulnerabilities can …

[PDF][PDF] Blockchain-based internet of vehicles in green smart city: applications and challenges and solutions

Y Salami, F Taherkhani, Y Ebazadeh, M Nemati… - Anthropog …, 2023 - researchgate.net
The ever-increasing growth of the population and their concentration in cities has destructive
and often catastrophic effects on natural habitats and human life and exposes cities to …

E3C: a tool for evaluating communication and computation costs in authentication and key exchange protocol

Y Salami, V Khajehvand, E Zeinali - Iran Journal of Computer Science, 2024 - Springer
Today, with the advancement of blockchain and Internet of Things (IoT) technologies, there
is a growing need for authentication protocols and key exchanges to facilitate …

[HTML][HTML] In-depth study of lightweight block ciphers: Performance assessment and implementation on sensor motes

A Hkiri, M Karmani, FH Alasmary, OB Bahri… - Alexandria Engineering …, 2025 - Elsevier
In the rapidly evolving landscape of the Internet of Things (IoT) and Wireless Sensor
Networks (WSN), the need for secure and efficient data transmission is paramount. Block …

Data Security Using Crypto Bipartite Graph Theory with Modified Diffie–Hellman Algorithm

VH Shastri, C Pragathi - Wireless Personal Communications, 2024 - Springer
Sharing confidential information over an unprotected channel is prone to privacy breaches
since unauthorized parties can steal the data. Therefore, developing a cryptosystem that …

[PDF][PDF] BSAMS: blockchain-based secure authentication scheme in meteorological systems

Y Salami, SR Hosseine - Journal of the Nivar, 2023 - nivar.irimo.ir
The security of communication between Internet of Things devices is a big concern in this
field, and with the increase in the number of devices and users, the current architecture and …

Efficiency simultaneous key exchange-cryptography extraction from public key in fog-cloud federation-based secure offloading for automatic weather stations …

Y Salami, V Khajehvand, E Zeinali - Nivar, 2023 - nivar.irimo.ir
Considering that in automatic weather station systems, raw data is collected by sensors by
AWSs, and these sensors themselves cannot process raw data. The data is sent to the CPS …

Cloud Cryptography

RD Saravanan, S Loganathan… - Emerging Trends in …, 2024 - igi-global.com
Cloud computing is a recent technology that facilitates wide access and storage on the
internet. Cloud computing faces few challenges like data loss, quality issues, and data …

Cryptographic Parameters Enhancement Using Pulsar Orbital Optimization

AK Al Hwaitat, SMA Tahoun - 2024 - researchsquare.com
In ophthalmic diagnostics, achieving precise segmentation of retinal blood vessels is a
critical yet challenging task, primarily due to the complex nature of retinal images. The …

Counter-Offset mode: A new paradigm in resisting differential cryptanalysis

MF Nawaz, Y Nawaz - Trends in Computer Science and …, 2024 - engineegroup.us
This study introduces the Counter-Offset mode, a novel advancement in block cipher
encryption techniques designed to enhance the traditional Counter mode's resistance to …