Towards Building a Faster and Incentive Enabled Privacy-Preserving Proof of Location Scheme from GTOTP

C Ma, Y Liu, Z Yang, J Ma - Electronics, 2024 - mdpi.com
In recent years, there has been significant growth in location-based services (LBSs) and
applications. These services empower users to transmit their location data to location …

[引用][C] Find out the innovative techniques of data sharing using cryptography by systematic literature review

A Sen, R Ahmed, S Hossain, SH Tasnim, T Ahmed - Turkish Journal of Computer and …, 2023

Security Evaluation of Different Hashing Functions with RSA for Digital Signature

M Badawy - IJCI. International Journal of Computers and …, 2023 - journals.ekb.eg
The emergence of the Internet of Things (IoT) represents a significant trend, where
integrating IP, data, and wireless technologies onto a single network yields substantial …

An Efficient Dual Encryption of IoMT data Using Lightweight Security Scheme for Cloud Based IoT Environment

S Kumar, K Abhishek, R Jhaveri, A Alabdulatif… - Proceedings of the 38th …, 2023 - dl.acm.org
As Internet of Things (IoT) technology develops, medical equipment, wearables, sensors,
and users can be linked together to create an ecosystem known as the Internet of Medical …

Secure and efficient data storage with Rivest Shamir Adleman algorithm in cloud environment

E Elumalai, D Muruganandam - Bulletin of Electrical Engineering and …, 2024 - beei.org
Cloud computing rapidly is a prerequisite and releases resources with minimal management
effort. The surfacing of the cloud has significantly distorted the general insight into …

[PDF][PDF] Ascertaining Speech Emotion using Attention-based Convolutional Neural Network Framework.

A Arya, V Arya, N Kohli, N Sukhija… - International Journal of …, 2023 - eprints.utm.my
Conversation among people is a profuse form of interaction that also carries emotional
information. Speech input has been the subject of numerous studies over the last ten years …

Performance Analysis of Hybrid Cryptographic Algorithms in Serverless Platforms

V Raj, S Suresh, MSB Phridviraj - International Conference on Advanced …, 2023 - Springer
Serverless computing has become the buzzword in IT and it has been widely accepted
because of its diverse cloud computing benefits. One of the major drawbacks of serverless …

Quantum Shield for IoT: Enhancing Bluetooth Security with a Novel Hybrid Encryption Algorithm

SAR Shirazi, A Wahab, SA Shah, A Anwar… - The Asian Bulletin of …, 2024 - abbdm.com
Bluetooth communication enables effective data sharing for a wide range of applications,
from audio streaming to IoT devices, boosting user ease and productivity. Bluetooth security …

An innovative design of substitution-box using Trigonometric-Multiplicative Functions Using Square Root Arguments: A Data-driven study.

SAR Shirazi, SA Shah, A Wahab… - The Asian Bulletin of Big …, 2024 - abbdm.com
In the evolving landscape of digital technology, the imperative for robust data security
mechanisms has escalated, given the increasing sophistication of cyber threats. This …

Digital signature algorithm based on ElGamal, Diffie-Hellman protocol and the number π

R Flores-Carapia, VM Silva-García… - 2023 - preprints.org
This research proposes an algorithm to sign messages using the ElGamal asymmetric
cryptosystem, called: Digital signature algorithm based on ElGamal, Diffie-Hellman protocol …