Key Cryptographic Methods in the Cloud: A Comparative Study

V Yadav, M Kumar - 2023 3rd International Conference on …, 2023 - ieeexplore.ieee.org
With cloud computing becoming an inseparable part of human daily life and making its way
in every field of technology during the last decade with smarter human generation and …

A Hybrid Cryptography Approach Using Symmetric, Asymmetric and DNA Based Encryption

V Yadav, M Kumar - 2023 3rd International Conference on …, 2023 - ieeexplore.ieee.org
Cloud computing is simply exchanging data over a digital network to a remote location. In
spite of security risks, cloud computing has become a necessity of human digital life …

Exploring 5G Architecture, Technologies, and Mobility Challenges: A Path to SDN-Based Future

M Yadav, D Nandal - 2023 International Conference on …, 2023 - ieeexplore.ieee.org
Over the time, the mobile technology has become a lot better. The latest one is called 5G. 5G
offers low latency, extensive user connectivity, and improved multi-broadband services. This …

Investigating Impact of 5G Mobility Management Over Handover

M Yadav, D Nandal - 2023 International Conference on …, 2023 - ieeexplore.ieee.org
The advent of 5G and other technological advancements will provide enhanced mobile
broadband, significantly reduced latency in communications, and the accommodation of …

Mobility Management in Heterogeneous Network Using Systematic Hierarchy Process and Seagull Optimization Algorithm

SS Sambare, MU Kharat - Futuristic Trends in Networks and Computing …, 2022 - Springer
Mobile Nodes (MN) can generally be interfaced with different wireless networks, changing
the quality of service for empowering the delivery of different classes of services. Multi …