Search
Search Results
-
Recent Lightweight cryptography (LWC) based security advances for resource-constrained IoT networks
In today's world, the Internet of Things (IoT) plays a major role to interconnect all the devices and improve the overall Quality of Life (QoL) for...
-
An Enhancement in Data Security Using Trellis Algorithm with DNA Sequences in Symmetric DNA Cryptography
In today’s world, most of the things are done online such as online banking, food ordering, car booking, and shop**. It is very difficult to...
-
Unintended Data Behaviour Analysis Using Cryptography Stealth Approach Against Security and Communication Network
Data security is based on the collection of data and storage without hacking from a third person has been proposed. While transmitting the data, the...
-
Post Quantum Public and Private Key Cryptography Optimized for IoT Security
The number of Internet of Things devices is growing exponentially with the introduction of 5G. They are incorporated into a wide spectrum of devices...
-
A Detailed Review Based on Secure Data Transmission Using Cryptography and Steganography
During the last few decades, digital communication has played a vital role in various sectors such as healthcare departments, banking, information...
-
Improved elliptical curve cryptography and chaotic map** with fruitfly optimization algorithm for secure data transmission
Cryptography is required while interacting through an insecure media, such as internet. Unauthorised individuals have the ability to view and alter...
-
Secure Data Transmission Using Optimized Cryptography and Steganography Using Syndrome-Trellis Coding
The establishment of secure data transmission among two communicating parties has become challenging. It is due to unexpected attacks during...
-
Security Techniques Implementation on Big Data Using Steganography and Cryptography
The COVID-19 pandemic has increased everyone’s exposure to the Internet thus there has been an addition of new people who now access the Internet and... -
Enhancement of Data Security for Cloud Computing with Cryptography Techniques
In cloud computing, users may access their crucial data that is kept on distant servers over the Internet. The amount of sensitive and important data... -
End-to-End Self-organizing Intelligent Security Model for Wireless Sensor Network based on a Hybrid (AES–RSA) Cryptography
In wireless sensor networks, ensuring data confidentiality and integrity is paramount, particularly in sensitive environments. However, existing...
-
An improved blockchain framework for ORAP verification and data security in healthcare
Currently, the move from traditional healthcare to smart healthcare systems is greatly aided by current technology. Healthcare proposes a new...
-
HCS: A Hybrid Data Security Enhancing Model Based on Cryptography Algorithms
With the advancement in technology, plenty of data is being shared between users using various mediums. And with this excessive data transmission, it... -
Overview of Security Approaches Using Metamorphic Cryptography
Initially, researchers employed only one information security technique either cryptography or steganography to secure the communication. But later,... -
An Effective Data Security Mechanism for Secured Data Communications Using Hybrid Cryptographic Technique and Quantum Key Distribution
One of the most flamboyant technological novelties of today's world is cloud computing, which has been fuelled by the increase in the number of smart...
-
Security Enhancement of Joint Procedure Based on Improved Elliptic Curve Cryptography in LoRaWAN
For long-range communication, Long-Range Wide Area Network (LoRaWAN) is the appropriate media access layer protocol. This LoRaWAN protocol connects...
-
Privacy and security of advanced metering infrastructure (AMI) data and network: a comprehensive review
The traditional electrical grid has to be digitally improved as digitalization and effective integration of renewable energy bring better efficiency,...
-
Design of area, energy and security optimized reversible architectures for digital image cryptography
Image data is frequently processed in multimedia, wireless, mobile communication etc. The digital images transmitted over the internet are prone to...
-
Review of VLSI Architecture of Cryptography Algorithm for IOT Security
A cipher is a data encryption and decryption algorithm used in modern cryptography. Secret key encryption, also referred to as symmetric key... -
Study of Secure Data Transmission-Based Wavelets Using Steganography and Cryptography Techniques
Cryptography and steganography algorithms are utilized along with wavelets based approach to enhance the data security during data transmission in... -
Breaking Barriers in Conventional Cryptography by Integrating with Quantum Key Distribution
Security techniques based on conventional cryptography assume keys are disseminated prior to secure communications in traditional security...