We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 1-20 of 10,000 results
  1. Recent Lightweight cryptography (LWC) based security advances for resource-constrained IoT networks

    In today's world, the Internet of Things (IoT) plays a major role to interconnect all the devices and improve the overall Quality of Life (QoL) for...

    Shraiyash Pandey, Bharat Bhushan in Wireless Networks
    Article 25 March 2024
  2. An Enhancement in Data Security Using Trellis Algorithm with DNA Sequences in Symmetric DNA Cryptography

    In today’s world, most of the things are done online such as online banking, food ordering, car booking, and shop**. It is very difficult to...

    K. Rama Devi, E. Bhuvaneswari in Wireless Personal Communications
    Article 16 November 2022
  3. Unintended Data Behaviour Analysis Using Cryptography Stealth Approach Against Security and Communication Network

    Data security is based on the collection of data and storage without hacking from a third person has been proposed. While transmitting the data, the...

    Mohammad Alauthman, Hanan Aljuaid, ... Awais Khan Jumani in Mobile Networks and Applications
    Article 21 August 2023
  4. Post Quantum Public and Private Key Cryptography Optimized for IoT Security

    The number of Internet of Things devices is growing exponentially with the introduction of 5G. They are incorporated into a wide spectrum of devices...

    Ajay Kaushik, Lakshmi Sai Srikar Vadlamani, ... Nalliyanna Goundar Veerappan Kousik in Wireless Personal Communications
    Article 28 December 2022
  5. A Detailed Review Based on Secure Data Transmission Using Cryptography and Steganography

    During the last few decades, digital communication has played a vital role in various sectors such as healthcare departments, banking, information...

    Fredy Varghese, P. Sasikala in Wireless Personal Communications
    Article 27 March 2023
  6. Improved elliptical curve cryptography and chaotic map** with fruitfly optimization algorithm for secure data transmission

    Cryptography is required while interacting through an insecure media, such as internet. Unauthorised individuals have the ability to view and alter...

    M. Indrasena Reddy, M. Purushotham Reddy, ... A. Praveen in Wireless Networks
    Article 09 November 2023
  7. Secure Data Transmission Using Optimized Cryptography and Steganography Using Syndrome-Trellis Coding

    The establishment of secure data transmission among two communicating parties has become challenging. It is due to unexpected attacks during...

    Fredy Varghese, P. Sasikala in Wireless Personal Communications
    Article 28 March 2023
  8. Security Techniques Implementation on Big Data Using Steganography and Cryptography

    The COVID-19 pandemic has increased everyone’s exposure to the Internet thus there has been an addition of new people who now access the Internet and...
    Divya Sharma, Ruchi Kawatra in ICT Analysis and Applications
    Conference paper 2023
  9. Enhancement of Data Security for Cloud Computing with Cryptography Techniques

    In cloud computing, users may access their crucial data that is kept on distant servers over the Internet. The amount of sensitive and important data...
    Conference paper 2024
  10. End-to-End Self-organizing Intelligent Security Model for Wireless Sensor Network based on a Hybrid (AES–RSA) Cryptography

    In wireless sensor networks, ensuring data confidentiality and integrity is paramount, particularly in sensitive environments. However, existing...

    V. Anusuya Devi, T. Sampradeepraj in Wireless Personal Communications
    Article 25 June 2024
  11. An improved blockchain framework for ORAP verification and data security in healthcare

    Currently, the move from traditional healthcare to smart healthcare systems is greatly aided by current technology. Healthcare proposes a new...

    Parag Rastogi, Devendra Singh, Sarabjeet Singh Bedi in Journal of Ambient Intelligence and Humanized Computing
    Article 12 April 2024
  12. HCS: A Hybrid Data Security Enhancing Model Based on Cryptography Algorithms

    With the advancement in technology, plenty of data is being shared between users using various mediums. And with this excessive data transmission, it...
    Ankit Singhal, Jatin Madan, Suman Madan in Advances in Information Communication Technology and Computing
    Conference paper 2023
  13. Overview of Security Approaches Using Metamorphic Cryptography

    Initially, researchers employed only one information security technique either cryptography or steganography to secure the communication. But later,...
    Conference paper 2023
  14. An Effective Data Security Mechanism for Secured Data Communications Using Hybrid Cryptographic Technique and Quantum Key Distribution

    One of the most flamboyant technological novelties of today's world is cloud computing, which has been fuelled by the increase in the number of smart...

    Jananya Sivakumar, Sannasi Ganapathy in Wireless Personal Communications
    Article 01 December 2023
  15. Security Enhancement of Joint Procedure Based on Improved Elliptic Curve Cryptography in LoRaWAN

    For long-range communication, Long-Range Wide Area Network (LoRaWAN) is the appropriate media access layer protocol. This LoRaWAN protocol connects...

    R. Sujatha, Vesela Radovic in Wireless Personal Communications
    Article 13 March 2023
  16. Privacy and security of advanced metering infrastructure (AMI) data and network: a comprehensive review

    The traditional electrical grid has to be digitally improved as digitalization and effective integration of renewable energy bring better efficiency,...

    Priscilla Oyeladun Ajiboye, Kwame Opuni-Boachie Obour Agyekum, Emmanuel Asuming Frimpong in Journal of Engineering and Applied Science
    Article Open access 12 April 2024
  17. Design of area, energy and security optimized reversible architectures for digital image cryptography

    Image data is frequently processed in multimedia, wireless, mobile communication etc. The digital images transmitted over the internet are prone to...

    K. Saranya, K. N. Vijeyakumar in Circuits, Systems, and Signal Processing
    Article 17 April 2023
  18. Review of VLSI Architecture of Cryptography Algorithm for IOT Security

    A cipher is a data encryption and decryption algorithm used in modern cryptography. Secret key encryption, also referred to as symmetric key...
    Conference paper 2024
  19. Study of Secure Data Transmission-Based Wavelets Using Steganography and Cryptography Techniques

    Cryptography and steganography algorithms are utilized along with wavelets based approach to enhance the data security during data transmission in...
    Chapter 2024
  20. Breaking Barriers in Conventional Cryptography by Integrating with Quantum Key Distribution

    Security techniques based on conventional cryptography assume keys are disseminated prior to secure communications in traditional security...

    A. Ahilan, A. Jeyam in Wireless Personal Communications
    Article 15 November 2022
Did you find what you were looking for? Share feedback.