Peer-to-peer user identity verification time optimization in iot blockchain network

AR Kairaldeen, NF Abdullah, A Abu-Samah, R Nordin - Sensors, 2023 - mdpi.com
Blockchain introduces challenges related to the reliability of user identity and identity
management systems; this includes detecting unfalsified identities linked to IoT applications …

Exploring security threats and solutions Techniques for Internet of Things (IoT): from vulnerabilities to vigilance

SK Sahu, K Mazumdar - Frontiers in Artificial Intelligence, 2024 - frontiersin.org
The rapid proliferation of Internet of Things (IoT) devices across various industries has
revolutionized the way we interact with technology. However, this widespread adoption has …

A novel symmetric cryptographic method to design block complexity for data security

B Umapathy, G Kalpana - Computers and Electrical Engineering, 2022 - Elsevier
The growth and development of Cloud Computing from its inception till today has made a
tremendous progress and the evident of the same is seen in every walk of life. However …

[Retracted] Digital Image Restoration Based on Multicontour Batch Scanning

Y Ding, Y Wei, S Zhang, S Yu - Scanning, 2022 - Wiley Online Library
In order to explore the problem of digital image restoration, the authors propose a research
on digital image restoration based on multicontour batch scanning. This method …

[HTML][HTML] A Deep Cryptographic Framework for Securing the Healthcare Network from Penetration

A Singh, VS Sharma, S Basheer, CL Chowdhary - Sensors, 2024 - mdpi.com
Ensuring the security of picture data on a network presents considerable difficulties because
of the requirement for conventional embedding systems, which ultimately leads to subpar …

[Retracted] Application of Symmetric Encryption Algorithm Sensor in the Research of College Student Security Management System

K Wu, C Li - Journal of sensors, 2022 - Wiley Online Library
In order to solve the problem of information leakage in the process of college students'
information security management, this paper proposes a design of college students' security …

Grid-based routing model for energy efficient and secure data transmission in wsn for smart building applications

V Sivasankarareddy, G Sundari, C Rami Reddy… - Applied Sciences, 2021 - mdpi.com
Presently, due to the establishment of a sensor network, residual buildings in urban areas
are being converted into smart buildings. Many sensors are deployed in various buildings to …

High-Level Design and Implementation of a Configurable Cryptosystem with a Novel Chaos-Enhanced Function

M Zeghid, HY Ahmed, AN Khan - IEEE Access, 2025 - ieeexplore.ieee.org
The widespread availability of networks has significantly increased the exposure of data to
security threats, necessitating robust encryption methods. While existing symmetric block …

A Comprehensive analysis of Cryptographic Algorithms: Evaluating Security, Efficiency, and Future Challenges

D Ramakrishna, MA Shaik - IEEE Access, 2024 - ieeexplore.ieee.org
Cryptographic techniques are reviewed in this literature study, with particular attention paid
to their applicability, Importance, contributions, And field strengths. These algorithms include …

FPGA implementation of a chaos-Towfish-based cryptosystem for medical image security

R Amdouni, M Gafsi, MA Hajjaji… - 2022 IEEE 21st …, 2022 - ieeexplore.ieee.org
In recent years, information and communication systems have experienced serious security
issues due to the rising popularity of image-sharing platforms and the ubiquity of numerous …