Design of pseudo-random number generator from turbulence padded chaotic map
S Krishnamoorthi, P Jayapaul, RK Dhanaraj… - Nonlinear …, 2021 - Springer
Transmission of the information in any form requires security. Security protocols used for
communication rely on the use of random numbers. Pseudo-random numbers are required …
communication rely on the use of random numbers. Pseudo-random numbers are required …
Cancelable Iris template for secure authentication based on random projection and double random phase encoding
Biometric recognition approaches have overwhelmed major issues in traditional
authentication systems. Privacy invasion and security are the needed features in the …
authentication systems. Privacy invasion and security are the needed features in the …
A perspective trend of hyperelliptic curve cryptosystem for lighted weighted environments
Abstract In modern cryptography, Light Weighted Environments (LWE) refer to low-
constrained environments (Pelzl et al., 2003) such as smartphones and other electronic …
constrained environments (Pelzl et al., 2003) such as smartphones and other electronic …
Enhanced WSN routing protocol for internet of things to process multimedia big data
V Rajasekar, P Jayapaul, S Krishnamoorthi… - Wireless Personal …, 2022 - Springer
Due to the massive use of wireless Internet of Things (IoT), the advent of multimedia-big-
data in recent decades poses numerous obstacles for successful contact with the virtual era …
data in recent decades poses numerous obstacles for successful contact with the virtual era …
Introduction to classical cryptography
V Rajasekar, J Premalatha… - Quantum Blockchain …, 2022 - Wiley Online Library
In today's world, with societies of information that transmits a growing number of personal
data via public channels, the protection of information is a global challenge. It is the …
data via public channels, the protection of information is a global challenge. It is the …
An Enhanced Anti-phishing Scheme to Detect Phishing Website
Phishing is a network attack in which attacker generates a replica of current legitimate site to
contrivance the users into submitting their personal and sensitive information. A good anti …
contrivance the users into submitting their personal and sensitive information. A good anti …
Cybersecurity in 5G and IoT Networks
Abstract 5G is generally regarded as a major improvement over 4G in terms of data
encryption and network consumer authentication. 5G would be a physical transformation of …
encryption and network consumer authentication. 5G would be a physical transformation of …
[PDF][PDF] Analysis and Improvement of Some Signcryption Schemes Based on Elliptic Curve
MZU Bashir - PhD diss., CAPITAL UNIVERSITY, 2022 - cust.edu.pk
Signcryption is a new technique in cryptography that fulfills the security requirements of
encryption and digital signature in a single logical step. This helps in reducing the …
encryption and digital signature in a single logical step. This helps in reducing the …
Design and development of digital e-library
V Rajasekar, J Varthini R - AIP Conference Proceedings, 2021 - pubs.aip.org
Digital libraries are platforms that allow users to access structured information in a
knowledge-based repository of data and access. In the end, the availability of good content …
knowledge-based repository of data and access. In the end, the availability of good content …
[PDF][PDF] MASK AND TEMPERATURE DETECTION SYSTEM USING TRANSFER LEARNING FOR PROTECTION AGAINST COVID-19
D Bisht, N Singhal, D Hara, M Sabharwal - researchgate.net
Businesses have challenges during COVID-19 era to upgrade their present structure and to
be more prompt, risk-free, and useful for worker, customers, and the people. With ongoing …
be more prompt, risk-free, and useful for worker, customers, and the people. With ongoing …