Object Oriented Modelling of Idea using GA based efficient key generation for e-governance security (OOMIG)

A Sarkar, S Karforma, JK Mandal - arXiv preprint arXiv:1204.1797, 2012 - arxiv.org
Nowadays different state and central government in India as well as abroad are taking
initiative to deliver different kind of services electronically specially using Information and …

[PDF][PDF] Enhanced encryption technique for secure iot data transmission

R Bhandari, VB Kirubanand - International Journal of …, 2019 - pdfs.semanticscholar.org
Internet of things is the latest booming innovation in the current period, which lets the
physical entity to process and intervene with the virtual entities. As all the entities relate to …

Object-oriented Modeling of IDEA for E-learning Security

A Ghosh, S Karforma - … Computing and Applications: Proceedings of the …, 2015 - Springer
E-learning system involves an open participation of student, teacher, and administrator
among different regions in the world. Due to the use of Internet as electronic communication …

[PDF][PDF] Secure Mechanism Applied to Big Data for IIoT by Using Security Event and Information Management System (SIEM).

MA Hussein, EK Hamza - International Journal of Intelligent Engineering & …, 2022 - inass.org
It is estimated that the number of devices and sensors connected to the Internet of Things
(Internet of Things) will grow to around 125 billion by the end of this decade, compared to 21 …

A Novel Mechanism for Design and Implementation of Confidentiality in Data for the Internet of Things with DES Technique

KV Sandeep, TC Manjunath - … Conference on I-SMAC (IoT in …, 2022 - ieeexplore.ieee.org
Confidentiality refers to the protection of data from unauthorised access. In other words, only
those who have been granted permission to do so will have access to sensitive information …

[PDF][PDF] Network security using notable cryptographic algorithm for IoT data

KAS Reddy - International Journal, 2020 - researchgate.net
ABSTRACT Internet of Things (IoT) performs an imperative job within the field of Information
Technology, Industries as well as Healthcare etc. As information within IoT application would …

Security Augmentation Approach for Internet of Things Enhanced Cryptographic Algorithm

SB Kumbalavati, KY Bendigeri… - … and Control Systems …, 2022 - ieeexplore.ieee.org
The Internet of Things (IoT) is continuously achieving pragmatic attention for research and
investigation as this technology have achieved considerable popularity worldwide because …

[PDF][PDF] Cryptographic algorithms for secure internet of things

K Mehta, Y Kumar, HS Sidhu - Int. J. Control Autom, 2020 - researchgate.net
As billions of devices are connected with one another, IoT (Internet of Things) that promises
technology solutions for solving daily lives of people. The increasing demand of Internet …

[PDF][PDF] Performance evaluation of IDEA encryption model under different fading channels

JA Patil, MM Patil - 2018 - academia.edu
With the introduction of the computer and communication, huge amounts of digital
information are gathered and stored in giant computer databases and transmitted between …

Internet of things (iot) security

S Kulkarni, S Durg, N Iyer - 2016 3rd International Conference …, 2016 - ieeexplore.ieee.org
Network Security is one of the important concepts in data security as the data to be uploaded
should be made secure. To make data secure, there exist number of algorithms like AES …