Analytical study of hybrid techniques for image encryption and decryption

CL Chowdhary, PV Patel, KJ Kathrotia, M Attique… - Sensors, 2020 - mdpi.com
The majority of imaging techniques use symmetric and asymmetric cryptography algorithms
to encrypt digital media. Most of the research works contributed in the literature focus …

Message queuing telemetry transport (MQTT) security: A cryptographic smart card approach

EB Sanjuan, IA Cardiel, JA Cerrada, C Cerrada - IEEE Access, 2020 - ieeexplore.ieee.org
The Message Queuing Telemetry Transport (MQTT) protocol is one of the most extended
protocols on the Internet of Things (IoT). However, this protocol does not implement a strong …

Enhancing privacy‐preserving mechanisms in Cloud storage: A novel conceptual framework

A Mishra, TS Jabar, YI Alzoubi… - … Practice and Experience, 2023 - Wiley Online Library
Data privacy is critical for users who want to use Cloud storage services. There is a
significant focus on Cloud service providers to address this need. However, in the evolving …

Proposing encryption selection model for IoT devices based on IoT device design

M Saleh, NZ Jhanjhi, A Abdullah… - 2022 24th International …, 2022 - ieeexplore.ieee.org
The shortage of resources and services coincides with the expansion of urbanization.
Modern technology utilization has become necessary to compensate for this shortage and to …

[PDF][PDF] A survey for comparative analysis of various cryptographic algorithms used to secure data on cloud

B Thakkar, B Thankachan - Int. J. Eng. Res. Technol, 2020 - academia.edu
Cloud computing is the recent trend for the growth in IT industry. We are able to store any
amount of data on cloud today whether it is text, image, audio, and video and many more …

[PDF][PDF] Message security level integration with iotes: A design dependent encryption selection model for iot devices

M Saleh, N Zaman, A Abdullah… - Int. J. Comput. Sci. Netw …, 2022 - academia.edu
Summary The Internet of Things (IoT) is a technology that offers lucrative services in various
industries to facilitate human communities. Important information on people and their …

Iotes (a machine learning model) design dependent encryption selection for iot devices

M Saleh, N Jhanjhi, A Abdullah… - 2022 24th International …, 2022 - ieeexplore.ieee.org
The data collected by IoT devices has a tremendous impact on today's world. Not only does
it increase one's awareness about his surroundings, but it also enables the businesses to …

[HTML][HTML] Review of algorithms for securing data transmission in mobile banking

DO Orucho, FM Awuor, R Makiya, C Oduor - Modern Economy, 2023 - scirp.org
With the dawn of mobile banking applications, bank customers can now register for M-
banking and download applications that aid them to access services from the bank server …

Can There Be a Two Way Hash Function?

T Koroglu, R Samet - IEEE Access, 2024 - ieeexplore.ieee.org
It is computationally impossible for one-way hash functions to obtain the original data again.
In this study, Two Way Hash Function (TWHF) is proposed which provides the security …

SFC: a lightweight blockchain model for smart food industry

S Yasmin, MFA Al Sohan, MNB Anwar… - … Electrical and Signal …, 2021 - ieeexplore.ieee.org
Introducing Blockchain (BC) within the Internet of Things (IoT) is a great combination for
ensuring privacy and security to any kind of data. Blockchain ensures the integrity of the data …