A review on security challenges and features in wireless sensor networks: IoT perspective

MA Burhanuddin, AAJ Mohammed… - Journal of …, 2018 - jtec.utem.edu.my
Abstract The Internet of Things is becoming a very promising paradigm with the extensive
market adoption of the development of associated technologies, such as; cloud computing …

A security model for preserving the privacy of medical big data in a healthcare cloud using a fog computing facility with pairing-based cryptography

HA Al Hamid, SMM Rahman, MS Hossain… - IEEE …, 2017 - ieeexplore.ieee.org
Nowadays, telemedicine is an emerging healthcare service where the healthcare
professionals can diagnose, evaluate, and treat a patient using telecommunication …

A survey of big data management: Taxonomy and state-of-the-art

A Siddiqa, IAT Hashem, I Yaqoob, M Marjani… - Journal of Network and …, 2016 - Elsevier
The rapid growth of emerging applications and the evolution of cloud computing
technologies have significantly enhanced the capability to generate vast amounts of data …

[PDF][PDF] A survey on cryptography algorithms

OG Abood, SK Guirguis - International Journal of Scientific and …, 2018 - academia.edu
DOI: 10.29322/IJSRP. 8.7. 2018. p7978 http://dx. doi. org/10.29322/IJSRP. 8.7. 2018. p7978
Abstract-With the major advancements in the field of technology and electronics, one …

Comprehensive study of symmetric key and asymmetric key encryption algorithms

MB Yassein, S Aljawarneh… - … on engineering and …, 2017 - ieeexplore.ieee.org
Cloud computing emerged in the last years to handle systems with large-scale services
sharing between vast numbers of users. It provides enormous storage for data and …

[PDF][PDF] Simple, efficient, highly secure, and multiple purposed method on data cryptography

M Mua'ad, K Aldebei, ZA Alqadi - Traitement du Signal, 2022 - academia.edu
Accepted: 3 January 2022 Some digital data circulated through various social media,
regardless of its nature, requires high-level protection and security for various reasons. In …

Software tools for learning artificial intelligence algorithms

S Stamenković, N Jovanović, B Vasović… - Artificial Intelligence …, 2023 - Springer
In recent years, artificial intelligence has become an important discipline in the field of
computer science. Students, in the absence of basic prior knowledge, may have difficulty …

[PDF][PDF] Cryptography: a comparative analysis for modern techniques

F Maqsood, M Ahmed, MM Ali… - International Journal of …, 2017 - pdfs.semanticscholar.org
Cryptography plays a vital role for ensuring secure communication between multiple entities.
In many contemporary studies, researchers contributed towards identifying best …

Retracted article: a multimodal biometric authentication scheme based on feature fusion for improving security in cloud environment

T Joseph, SA Kalaiselvan, SU Aswathy… - Journal of Ambient …, 2021 - Springer
In recent days, due to the advent of advanced technologies such as cloud computing,
accessing data can be done anywhere at any time. Meanwhile, ensuring the data security is …

Revisiting shift cipher technique for amplified data security

R Verma, A Kumari, A Anand… - … of Computational and …, 2024 - ojs.bonviewpress.com
Ever since manual work is overtaken by technology and the rapid advancement in the
technologies for performing all kinds of work online has created new possibilities for the …