[HTML][HTML] Cryptographic data security for reliable wireless sensor network

S Urooj, S Lata, S Ahmad, S Mehfuz… - Alexandria Engineering …, 2023 - Elsevier
Abstract Wireless Sensor Networks (WSNs) are widely utilized in a variety of applications.
Attackers might interfere with equipment, and eavesdrop on conversations. Attackers can …

[PDF][PDF] A review on DES, AES and blowfish for image encryption & decryption

A Devi, A Sharma, A Rangra - International Journal of Computer Science …, 2015 - Citeseer
Network Security is the most vital component in information security because it is
responsible for securing all information passed through networked computers.[1] In this …

A secure steganography creation algorithm for multiple file formats

R Vinothkanna - Journal of Innovative Image Processing, 2019 - irojournals.com
The technological advancements in the information sharing and the development of many
techniques to make the information conveyance easy necessitate a protection methodology …

[HTML][HTML] Two-phase hybrid cryptography algorithm for wireless sensor networks

R Rizk, Y Alkady - Journal of Electrical Systems and Information …, 2015 - Elsevier
For achieving security in wireless sensor networks (WSNs), cryptography plays an important
role. In this paper, a new security algorithm using combination of both symmetric and …

[PDF][PDF] Improving the security of cloud computing by building new hybrid cryptography algorithms

DS AbdElminaam - International Journal of Electronics and …, 2018 - ijeie.jalaxy.com.tw
Cryptography considered from the old science that are human learn it and motivated it
through all past years, Cryptography consist of two main items encryption and decryption …

A novel approach to the design of a new hybrid security protocol architecture

K Bhatele, A Sinhal, M Pathak - 2012 IEEE International …, 2012 - ieeexplore.ieee.org
This research paper is simply the gathering of recent developments in the field of Hybrid
cryptography and its application in the designing of a hybrid security protocol for online …

A proposed scheme to achieve node authentication in military applications of wireless sensor network

D Suhag, SS Gaur, AK Mohapatra - Journal of Statistics and …, 2019 - Taylor & Francis
Abstract Wireless Sensor Network is one of the most rapidly evolving networks which are
being deployed in a wide variety of applications like agriculture, environment monitoring …

A new security protocol using hybrid cryptography algorithms

Y Alkady, MI Habib, RY Rizk - 2013 9th International Computer …, 2013 - ieeexplore.ieee.org
A group of sensor nodes deployed in particular environment constitutes a wireless sensor
network (WSN). At times the WSN can be even deployed in a very sensitive area where the …

Hybrid encryption algorithm in wireless body area networks (WBAN)

S Farooq, D Prashar, K Jyoti - … and Devices: Proceedings of ICICCD 2017, 2018 - Springer
The wireless body area network is part of wireless sensor network in which both indoor and
outdoor patients are monitored using sensors and wireless technology. The critical phase of …

Hybrid cryptography algorithm for secure and low cost communication

SK Ghosh, S Rana, A Pansari, J Hazra… - … on Computer Science …, 2020 - ieeexplore.ieee.org
In a client-server architecture or open networks such as the internet, transmission of data
may lead to leak of confidential information. The objective of encryption is to secure or …