[HTML][HTML] Providing Security for Flash Loan System Using Cryptocurrency Wallets Supported by XSalsa20 in a Blockchain Environment

M Al-Zubaidie, WA Jebbar - Applied Sciences, 2024 - mdpi.com
The days of long lines at banks and piles of paperwork are long gone. The lending
landscape has been completely transformed by digital loans, which provide a quick, easy …

Recent Lightweight cryptography (LWC) based security advances for resource-constrained IoT networks

S Pandey, B Bhushan - Wireless Networks, 2024 - Springer
In today's world, the Internet of Things (IoT) plays a major role to interconnect all the devices
and improve the overall Quality of Life (QoL) for people. The main concern among IoT …

Hybrid Cipher-Text Key Policy Attribute-Based Encryption (HCKP-ABE): The Performance Analysis and Scalability in Virtual Machines

A Siva Swaroopa Rani, K Rohini… - … of Computing and …, 2024 - journal.uob.edu.bh
Attribute-based encryption (ABE) has appeared as a promising advanced cryptographic
approach that has emerged is a viable option for secure sharing of data. ABE is particularly …

Post-Quantum Cryptography X. 509 Certificate

ACH Chen - 2024 International Conference on Smart Systems …, 2024 - ieeexplore.ieee.org
In recent years, with the development of quantum computing, mainstream cryptographic
algorithms in current PKI systems have gradually become threatened. In light of this, this …

Design and Implementation of Discrete Field Arithmetic-Based Cylindrical Coil-Driven Crypto Framework for Cloud Data

S Sasi, SBV Subbu, P Manoharan… - Journal of …, 2022 - ojs.bonviewpress.com
The ability to interpret and create code is known as cryptography and has been used to
exchange information between peer parties securely. An encryption algorithm is a type of …

A Comprehensive Analysis of Regression Test Case Assessment Using Humpback Whale Optimization

K Upreti, S Ghosh, P Vats, HP Patil, R Bhardwaj… - … Conference on Data …, 2023 - Springer
Software development must include regression testing to ensure that changes do not
adversely affect already-existing functionality. Yet, it can be expensive in terms of time as …

Mitigating Risks in the Internet of Things: Contemporary Security Challenges and Defensive Measures

S Patil, S Upreti, A Kapoor… - JOURNAL OF …, 2023 - scienceandtech.co.uk
This paper contains a surveyas well as an investigation and examination of the present
situation statesecurity for the Internet of Things (IoT). The Internet of Things aims to connect …

Experimental Evaluation of an Elliptical Curve Cryptographic Model Based Data Security Over Communication Channels Using Cybersecurity Logics

VS Prakash, KK Thavamani… - 2024 International …, 2024 - ieeexplore.ieee.org
In light of the escalating cybersecurity challenges, we propose a comprehensive approach
to evaluating the effectiveness of an Elliptic Curve Cryptographic (ECC) model in enhancing …