PRC6: Hybrid lightweight cipher for enhanced cloud data security in parallel environment

ZA Mohammed, KA Hussein - Security and Privacy, 2024 - Wiley Online Library
Modern technologies of computing cloud are showing great promise, but at the same time
create new security challenges that hinder full acceptance. Given that most of these services …

A New Approach to Design KM1 Encryption Algorithm for Alarm in IoT

MD Taha, KA Hussein - National Conference on New Trends in …, 2023 - Springer
The research introduces a hybrid encryption system for parallel computing environments,
focusing on safeguarding IoT image data for fire incident detection and response. The …

Design and Implementation of Power-Efficient Cryptography Scheme Using a Novel Multiplication Technique

B Srikanth, JVR Ravindra, P Ramakrishna… - Wireless Personal …, 2023 - Springer
The threat application and data hacking systems rule today's digital world. Hence, securing
digital information is the most needed to keep personal detail confidential. Several …

Incidencia de la computación cuántica en los algoritmos criptográficos

EO Espín-Bernardi… - Código …, 2024 - revistacodigocientifico.itslosandes …
La computación cuántica representa una innovadora frontera tecnológica con el potencial
de revolucionar diversas áreas incluyendo la criptografía, que es esencial para garantizar la …

Check for updates Authentication System Based on Zero-Knowledge Proof Employing the Rabin Cryptosystem and a Secret Sharing Schema

SM Shlaka, HBA Wahab - … , NTICT 2023, Baghdad, Iraq, December 20 … - books.google.com
Passwords play a significant role in the authentication process for web applications. These
applications are widely employed to deliver a diverse range of crucial services, making their …

[PDF][PDF] A Modern Mechanism for Formal Analysis of Biometric Authentication Security Protocol

R Pradeep, NR Sunitha, GS Thejas - researchgate.net
A Biometric Authentication Security (BAS) protocol is a method by which a person's unique
physiological or behavioral characteristics are used to verify their identity. These …