Secure IoT framework for authentication and confidentiality using hybrid cryptographic schemes

S Ali, F Anwer - International Journal of Information Technology, 2024 - Springer
IoTs are increasingly gaining popularity and prevalence due to their extensive applications
across various domains. They gather data from the real environment and transmit it through …

Utilization of Mobile Network Infrastructure to Prevent Financial Mobile Application Account Takeover

A Prayogi, RF Aji - Jurnal RESTI (Rekayasa Sistem dan Teknologi …, 2023 - jurnal.iaii.or.id
The Covid-19 pandemic has kept almost everyone at home and forced them to perform
online activities using their mobile gadgets. Penetration of the Internet and mobile use is …

Comparative Analysis of Various Elliptic Curve Cryptography Algorithms for Handheld Devices

KK Kamal, S Gupta, P Joshi… - 2023 7th International …, 2023 - ieeexplore.ieee.org
Today, all functions like purchases, banking, payments, social media, games, etc. are
carried out using mobile phones. While performing these functionalities data transmission …

A Framework for Identity Management on Mobile Devices for mGovernance Application

KK Kamal, S Gupta, P Joshi - 2024 International Conference on …, 2024 - ieeexplore.ieee.org
In the past decade, mobile computing has spurred the development of diverse user-centric
applications, enhancing the capabilities of service providers and government entities …

Investigating Artificial Intelligence-based Solution for Protecting Online Gaming Servers Against Anomalies

A Kaur, T Khanna, R Dubey… - 2023 Global Conference …, 2023 - ieeexplore.ieee.org
The proliferation of affordable mobile phones and computers has led to an increasing
prevalence of individuals engaging in game-playing activities. This trend has been …