A comprehensive survey of cryptography key management systems
Cryptographic methods have been extensively employed in various systems to address
security objectives, such as data confidentiality, authentication, and secure communication …
security objectives, such as data confidentiality, authentication, and secure communication …
Hybrid cryptography algorithms in cloud computing: A review
it's observed that most people and firms are migrating to the cloud, because the cloud is
much cheaper and convenient. For some computer owners, finding enough storage space to …
much cheaper and convenient. For some computer owners, finding enough storage space to …
A Comparison Based Approach on Mutual Authentication and Key Agreement Using DNA Cryptography
K Jain, P Krishnan, VV Rao - 2021 Fourth International …, 2021 - ieeexplore.ieee.org
Cryptography is the science of encryption and decryption of data using the techniques of
mathematics to achieve secure communication. This enables the user to send the data in an …
mathematics to achieve secure communication. This enables the user to send the data in an …
Information Theory, Living Systems, and Communication Engineering
D Bajić - Entropy, 2024 - mdpi.com
Mainstream research on information theory within the field of living systems involves the
application of analytical tools to understand a broad range of life processes. This paper is …
application of analytical tools to understand a broad range of life processes. This paper is …
KryptosChain—a blockchain-inspired, AI-combined, DNA-encrypted secure information exchange scheme
Today's digital world necessitates the adoption of encryption techniques to ensure secure
peer-to-peer communication. The sole purpose of this paper is to conglomerate the …
peer-to-peer communication. The sole purpose of this paper is to conglomerate the …
Secure framework for IoT technology based on RSA and DNA cryptography
MM Elamir, MS Mabrouk, SY marzouk - Egyptian Journal of Medical …, 2022 - Springer
Abstract Background The Internet of things (IoT) is the network of different objects or “things”
containing sensors, software, and other technologies used to exchange data between …
containing sensors, software, and other technologies used to exchange data between …
[PDF][PDF] A theoretical comparative analysis of DNA techniques used in dna based cryptography
NAN Abdullah, NH Zakaria, AH Ab Halim… - Journal of …, 2022 - jssm.umt.edu.my
Cryptography has been extensively employed in the information security field for the
purpose of providing security for confidential data. The field of cryptography has recently …
purpose of providing security for confidential data. The field of cryptography has recently …
An efficacious neural network and DNA cryptography-based algorithm for preventing black hole attacks in MANET
R Chakravorty, J Prakash, A Srivastava - Soft Computing, 2024 - Springer
Today, more than ever, the necessity for remote availability, independent of a client's
location, is driving the popularity of remote systems. WiFi, Bluetooth, and GPRS are just a …
location, is driving the popularity of remote systems. WiFi, Bluetooth, and GPRS are just a …
Hybrid encryption technique: Integrating the neural network with distortion techniques
R Abu Zitar, MJ Al-Muhammed - Plos one, 2022 - journals.plos.org
This paper proposes a hybrid technique for data security. The computational model of the
technique is grounded on both the non-linearity of neural network manipulations and the …
technique is grounded on both the non-linearity of neural network manipulations and the …
[PDF][PDF] Design and Implementation of a New DNA Based Stream Cipher Algorithm using Python.
KH Rahouma, FM AbdelGhany, LN Mahdy… - Egyptian Computer …, 2020 - ecsjournal.org
This paper proposes a design and implementation of a new DNA-Based stream cipher
algorithm. We implement this algorithm using python language and django framework. The …
algorithm. We implement this algorithm using python language and django framework. The …