[HTML][HTML] An improved random bit-stuffing technique with a modified RSA algorithm for resisting attacks in information security (RBMRSA)

FO Mojisola, S Misra, CF Febisola… - Egyptian Informatics …, 2022 - Elsevier
The recent innovations in network application and the internet have made data and network
security the major role in data communication system development. Cryptography is one of …

AIoT-Based Smart Healthcare in Everyday Lives: Data Collection and Standardization from Smartphones and Smartwatches

G Ji, J Woo, G Lee, C Msigwa… - IEEE Internet of Things …, 2024 - ieeexplore.ieee.org
AIoT-based smart healthcare system that utilize smart devices can provide personalized,
proactive care to patients, reducing the reliance on limited medical service capacities and …

[PDF][PDF] A multilayer model to enhance data security in cloud computing

WA Awadh, AS Alasady, MS Hashim - Indonesian Journal of …, 2023 - academia.edu
Cloud computing has introduced substantial advancements to the field of information
technology, offering businesses enhanced features, flexibility, reliability, scalability, and a …

[PDF][PDF] Analysis of code-based digital signature schemes.

R Khurana, E Narwal - International Journal of Electrical & …, 2023 - researchgate.net
Digital signatures are in high demand because they allow authentication and non-
repudiation. Existing digital signature systems, such as digital signature algorithm (DSA) …

CLEA-256-based text and image encryption algorithm for security in IOD networks

S Samanth, P KV, M Balachandra - Cogent Engineering, 2023 - Taylor & Francis
Drones are resource-constrained devices that monitor areas that are not easily reachable by
humans. A network of drone (s) and a Ground Control Station (GCS) are called an Internet of …

Performance analysis: Securing SIP on multi-threaded/multi-core proxy server using public keys on Diffie–Hellman (DH) in single and multi-server queuing scenarios

DS Bhatti, S Sidrat, S Saleem, AW Malik, BK Suh… - Plos one, 2024 - journals.plos.org
The rapid replacement of PSTN with VOIP networks indicates the definitive phase-out of the
PBX/PABX with smartphone-based VOIP technology that uses WLAN connectivity for local …

Integrating deep learning and metaheuristics algorithms for blockchain-based reassurance data management in the detection of malicious IoT nodes

FM Alserhani - Peer-to-Peer Networking and Applications, 2024 - Springer
Abstract The Internet of Things (IoT) refers to a network where different smart devices are
interconnected through the Internet. This network enables these devices to communicate …

Data security using low bit encoding algorithm and rsa algorithm

Y Ramadhan, S Suhardi, Y Aditama - Jurnal Mantik, 2024 - iocscience.org
Ensuring the security of messages and information is paramount in today's digital era. This
study proposes a combined approach using the RSA algorithm for cryptography and the …

[HTML][HTML] Factorization of large tetra and penta prime numbers on IBM quantum processor

R Dhaulakhandi, BK Behera, FJ Seo - APL Quantum, 2024 - pubs.aip.org
The factorization of large digit integers in polynomial time is a challenging computational
task to decipher. The development of Shor's algorithm sparked a new resolution for solving …

A secure IoT and Edge Computing based EV selection model in V2G systems using ant colony optimization algorithm

G Anjinappa, D Bangalore Prabhakar - International Journal of …, 2022 - emerald.com
Purpose The fluctuations that occurred between the power requirements have shown a
higher range of voltage regulations and frequency. The fluctuations are caused because of …