Hybrid cryptographic approach to enhance the mode of key management system in cloud environment

S Ahmad, S Mehfuz, J Beg - The Journal of Supercomputing, 2023 - Springer
Cloud computing has gained great attention among the individual user and the organization.
Transitioning to the cloud platform is not simple as it involves various cybersecurity and …

[HTML][HTML] Efficient time-oriented latency-based secure data encryption for cloud storage

S Ahmad, S Mehfuz - Cyber Security and Applications, 2024 - Elsevier
To ensure data security in the cloud, there exist several techniques proposed by various
researchers. The most common method is the usage of data encryption techniques like …

Security management in smart home environment

LM Gladence, VM Anu, S Revathy, P Jeyanthi - Soft Computing, 2021 - Springer
A smart home environment comprises various luxurious things which makes us very
comfortable to live our lives happily and securely. The only problem that smart homes are …

[PDF][PDF] Secure Key Management Based Mobile Authentication in Cloud.

SS Priya, D Yuvaraj, TS Murthy… - … Systems Science & …, 2022 - cdn.techscience.cn
Authentication is important to the security of user data in a mobile cloud environment.
Because of the server's user credentials, it is subject to attacks. To maintain data …

[PDF][PDF] Enhanced Route Optimization for Wireless Networks Using Meta-Heuristic Engineering.

SN Krishnan, PS Vadivel, D Yuvaraj… - Comput. Syst. Sci …, 2022 - cdn.techscience.cn
Wireless Sensor Networks (WSN) are commonly used to observe and monitor precise
environments. WSNs consist of a large number of inexpensive sensor nodes that have been …

Offensive Security of Keyboard Data Using Machine Learning for Password Authentication in IoT

K Lee, J Lee, C Choi, K Yim - IEEE Access, 2021 - ieeexplore.ieee.org
In this paper, to increase the attack success rate, we analyzed the distribution of all collected
keyboard data based on the distance of time and keyboard scancode data, which presents …

AI-Driven Prediction of Average Per Capita GDP: Exploring Linear and Nonlinear Statistical Techniques

SNM Abbood, SA Alnuaimi, SH Ali… - Journal of Electrical …, 2024 - search.proquest.com
Average per capita GDP income is an important economic indicator. Economists use this
term to determine the amount of progress or decline in the country's economy. It is also used …

Systematic Review on Multiply and Accumulate Unit (MAC) Architectures and Comparison with Various Multipliers

SS Alnuaimi, D Yuvaraj, SF Noori, P Sudhakaran - IIRJET, 2023 - iirjet.org
The basic architecture of digital signal processing and digital image processing systems is
the Multiply and Accumulate (Mac) architecture. Digital signal processing applications …

[PDF][PDF] Secured 6-digit OTP generation using B-exponential chaotic map

R Naik, U Singh - … Journal of Advanced Computer Science and …, 2021 - academia.edu
Today, the traditional username and password systems are becoming less popular on the
internet due to their vulnerabilities. These systems are prone to replay attacks and …

Bringing Them Home: The Role of Azure Face API in Finding Missing Person

Y Duraisamy, SS Alnuaimi - 2024 5th International …, 2024 - ieeexplore.ieee.org
This study aims to develop a system for finding missing persons using the Azure Face API
service. The system will allow users to upload an image of a missing person and use facial …