A fuzzy ontology-based context-aware encryption approach in IoT through device and information classification

F Zeshan, Z dar, A Ahmad, T Malik - The Journal of Supercomputing, 2024 - Springer
IoT devices produce a vast amount of data ranging from personal to sensitive information.
Usually, these devices remain connected to the internet so protecting the information …

[PDF][PDF] Cryptography as a dual-faceted instrument of security and vulnerability

M Iavich, S Simonovi, T Okhrimenko - 2024 - ceur-ws.org
Cryptography is an important field dedicated to securing data transmission through
advanced algorithms and techniques. Everyday applications of cryptographic algorithms …

[PDF][PDF] The evolution of digital signatures: From classical to post-quantum

M Iavich - 2024 - ceur-ws.org
The paper investigates the vulnerability of classical digital signatures, particularly RSA, in
the face of advancing quantum computing. Shor's algorithm, which is capable of efficiently …

A Fuzzy Ontology-based Context-aware Encryption approach in IoT through Device and Information Classification

Z Dar, A Ahmad, F Zeshan, T Malik - 2023 - researchsquare.com
IoT devices produce a vast amount of data ranging from personal to sensitive information.
Usually, these devices remain connected to the internet so protecting the information …