[HTML][HTML] An improved random bit-stuffing technique with a modified RSA algorithm for resisting attacks in information security (RBMRSA)
FO Mojisola, S Misra, CF Febisola… - Egyptian Informatics …, 2022 - Elsevier
The recent innovations in network application and the internet have made data and network
security the major role in data communication system development. Cryptography is one of …
security the major role in data communication system development. Cryptography is one of …
AIoT-Based Smart Healthcare in Everyday Lives: Data Collection and Standardization from Smartphones and Smartwatches
AIoT-based smart healthcare system that utilize smart devices can provide personalized,
proactive care to patients, reducing the reliance on limited medical service capacities and …
proactive care to patients, reducing the reliance on limited medical service capacities and …
[PDF][PDF] A multilayer model to enhance data security in cloud computing
Cloud computing has introduced substantial advancements to the field of information
technology, offering businesses enhanced features, flexibility, reliability, scalability, and a …
technology, offering businesses enhanced features, flexibility, reliability, scalability, and a …
[PDF][PDF] Analysis of code-based digital signature schemes.
R Khurana, E Narwal - International Journal of Electrical & …, 2023 - researchgate.net
Digital signatures are in high demand because they allow authentication and non-
repudiation. Existing digital signature systems, such as digital signature algorithm (DSA) …
repudiation. Existing digital signature systems, such as digital signature algorithm (DSA) …
CLEA-256-based text and image encryption algorithm for security in IOD networks
Drones are resource-constrained devices that monitor areas that are not easily reachable by
humans. A network of drone (s) and a Ground Control Station (GCS) are called an Internet of …
humans. A network of drone (s) and a Ground Control Station (GCS) are called an Internet of …
Performance analysis: Securing SIP on multi-threaded/multi-core proxy server using public keys on Diffie–Hellman (DH) in single and multi-server queuing scenarios
The rapid replacement of PSTN with VOIP networks indicates the definitive phase-out of the
PBX/PABX with smartphone-based VOIP technology that uses WLAN connectivity for local …
PBX/PABX with smartphone-based VOIP technology that uses WLAN connectivity for local …
Integrating deep learning and metaheuristics algorithms for blockchain-based reassurance data management in the detection of malicious IoT nodes
FM Alserhani - Peer-to-Peer Networking and Applications, 2024 - Springer
Abstract The Internet of Things (IoT) refers to a network where different smart devices are
interconnected through the Internet. This network enables these devices to communicate …
interconnected through the Internet. This network enables these devices to communicate …
Data security using low bit encoding algorithm and rsa algorithm
Y Ramadhan, S Suhardi, Y Aditama - Jurnal Mantik, 2024 - iocscience.org
Ensuring the security of messages and information is paramount in today's digital era. This
study proposes a combined approach using the RSA algorithm for cryptography and the …
study proposes a combined approach using the RSA algorithm for cryptography and the …
[HTML][HTML] Factorization of large tetra and penta prime numbers on IBM quantum processor
R Dhaulakhandi, BK Behera, FJ Seo - APL Quantum, 2024 - pubs.aip.org
The factorization of large digit integers in polynomial time is a challenging computational
task to decipher. The development of Shor's algorithm sparked a new resolution for solving …
task to decipher. The development of Shor's algorithm sparked a new resolution for solving …
A secure IoT and Edge Computing based EV selection model in V2G systems using ant colony optimization algorithm
G Anjinappa, D Bangalore Prabhakar - International Journal of …, 2022 - emerald.com
Purpose The fluctuations that occurred between the power requirements have shown a
higher range of voltage regulations and frequency. The fluctuations are caused because of …
higher range of voltage regulations and frequency. The fluctuations are caused because of …