Quantum cryptography research over the past two decades–Review, research implications, and future directions

S Singh, V Bharathi - AIP Conference Proceedings, 2023 - pubs.aip.org
The study proposes a unique blend of bibliometric analysis and systematic literature review
con-ducted on the Scopus database to extensively review and bring out the research …

[PDF][PDF] Voice Recognition Systems for The Disabled Electorate: Critical Review on Architectures and Authentication Strategies.

OM Olaniyi, JA Bala, S Ganiyu… - Computer …, 2023 - researchgate.net
An inevitable factor that makes the concept of electronic voting irresistible is the fact that it
offers the possibility of exceeding the manual voting process in terms of convenience …

Cyber Security in the Age of COVID-19

AJ Gabriel, A Darwsih, AE Hassanien - Digital transformation and …, 2021 - Springer
As a containment strategy for the dreaded Corona Virus Disease 19 (COVID 19) which is
spreading rapidly and causing severe damage to life and economy of nations, places of …

A Secure Electronic Voting System Using Multifactor Authentication and Blockchain Technologies

OM Olaniyi, EM Dogo, BK Nuhu, H Treiblmaier… - … Applications in the …, 2022 - Springer
This chapter presents a distributed e-voting system that solves the problems of vote-rigging,
voter impersonation, and vote falsification, all of which are prevalent in traditional paper …

Multifactor IoT Authentication System for Smart Homes Using Visual Cryptography, Digital Memory, and Blockchain Technologies

A Thompson, A Abayomi, AJ Gabriel - Blockchain Applications in the …, 2022 - Springer
In this era of smartness, the existing access control of things and objects in homes utilizes
personal identification number (PIN)-or password-based authentication scheme, which …

[PDF][PDF] Quantum attack-resistant security system for cloud computing using lattice cryptography

HC Ukwuoma, AJ Gabriel… - International Journal …, 2022 - infonomics-society.org
The safety and security of various cryptosystems are related to the hardness of the integer
factorization problem and discrete logarithm problem, most cryptosystems will be rendered …

A two-layer image-steganography system for covert communication over enterprise network

AJ Gabriel, AO Adetunmbi, P Obaila - … Conference, Cagliari, Italy, July 1–4 …, 2020 - Springer
Computers find application in virtually all aspect of human existence, especially in today's
modern world. Although this comes with a lot of benefits, it also comes with a number of …

A new post-quantum voting protocol based on physical laws

Z Sun, W Gao, H Dong, H Xie, L Yang - Quantum Information Processing, 2022 - Springer
The post-quantum security of electronic voting protocols such as lattice-based ones are
based on the assumption of certain difficult computational problems, which cannot be solved …

[HTML][HTML] Perspective Chapter: Quantum Steganography–Encoding Secrets in the Quantum Domain

A Agrawal, R Soni, A Tomar - 2024 - intechopen.com
The chapter provides a comprehensive overview of the evolving field of quantum
steganography, highlighting its potential impact on information security in the age of …

Development of an audio steganography system using discrete cosine transform and spread spectrum techniques

OT Adeboje, AJ Gabriel, AO Adetunmbi - … , Cagliari, Italy, July 1–4, 2020 …, 2020 - Springer
In today's electronic society, security of information is an issue of major concern especially in
the communication domain. Indeed, there is a very serious need for schemes that guarantee …