Quantum cryptography research over the past two decades–Review, research implications, and future directions
S Singh, V Bharathi - AIP Conference Proceedings, 2023 - pubs.aip.org
The study proposes a unique blend of bibliometric analysis and systematic literature review
con-ducted on the Scopus database to extensively review and bring out the research …
con-ducted on the Scopus database to extensively review and bring out the research …
[PDF][PDF] Voice Recognition Systems for The Disabled Electorate: Critical Review on Architectures and Authentication Strategies.
OM Olaniyi, JA Bala, S Ganiyu… - Computer …, 2023 - researchgate.net
An inevitable factor that makes the concept of electronic voting irresistible is the fact that it
offers the possibility of exceeding the manual voting process in terms of convenience …
offers the possibility of exceeding the manual voting process in terms of convenience …
Cyber Security in the Age of COVID-19
AJ Gabriel, A Darwsih, AE Hassanien - Digital transformation and …, 2021 - Springer
As a containment strategy for the dreaded Corona Virus Disease 19 (COVID 19) which is
spreading rapidly and causing severe damage to life and economy of nations, places of …
spreading rapidly and causing severe damage to life and economy of nations, places of …
A Secure Electronic Voting System Using Multifactor Authentication and Blockchain Technologies
This chapter presents a distributed e-voting system that solves the problems of vote-rigging,
voter impersonation, and vote falsification, all of which are prevalent in traditional paper …
voter impersonation, and vote falsification, all of which are prevalent in traditional paper …
Multifactor IoT Authentication System for Smart Homes Using Visual Cryptography, Digital Memory, and Blockchain Technologies
A Thompson, A Abayomi, AJ Gabriel - Blockchain Applications in the …, 2022 - Springer
In this era of smartness, the existing access control of things and objects in homes utilizes
personal identification number (PIN)-or password-based authentication scheme, which …
personal identification number (PIN)-or password-based authentication scheme, which …
[PDF][PDF] Quantum attack-resistant security system for cloud computing using lattice cryptography
HC Ukwuoma, AJ Gabriel… - International Journal …, 2022 - infonomics-society.org
The safety and security of various cryptosystems are related to the hardness of the integer
factorization problem and discrete logarithm problem, most cryptosystems will be rendered …
factorization problem and discrete logarithm problem, most cryptosystems will be rendered …
A two-layer image-steganography system for covert communication over enterprise network
AJ Gabriel, AO Adetunmbi, P Obaila - … Conference, Cagliari, Italy, July 1–4 …, 2020 - Springer
Computers find application in virtually all aspect of human existence, especially in today's
modern world. Although this comes with a lot of benefits, it also comes with a number of …
modern world. Although this comes with a lot of benefits, it also comes with a number of …
A new post-quantum voting protocol based on physical laws
Z Sun, W Gao, H Dong, H Xie, L Yang - Quantum Information Processing, 2022 - Springer
The post-quantum security of electronic voting protocols such as lattice-based ones are
based on the assumption of certain difficult computational problems, which cannot be solved …
based on the assumption of certain difficult computational problems, which cannot be solved …
[HTML][HTML] Perspective Chapter: Quantum Steganography–Encoding Secrets in the Quantum Domain
The chapter provides a comprehensive overview of the evolving field of quantum
steganography, highlighting its potential impact on information security in the age of …
steganography, highlighting its potential impact on information security in the age of …
Development of an audio steganography system using discrete cosine transform and spread spectrum techniques
In today's electronic society, security of information is an issue of major concern especially in
the communication domain. Indeed, there is a very serious need for schemes that guarantee …
the communication domain. Indeed, there is a very serious need for schemes that guarantee …