Big Data and cloud computing: innovation opportunities and challenges

C Yang, Q Huang, Z Li, K Liu, F Hu - International Journal of Digital …, 2017 - Taylor & Francis
Big Data has emerged in the past few years as a new paradigm providing abundant data
and opportunities to improve and/or enable research and decision-support applications with …

Cybersecurity for industrial control systems: A survey

D Bhamare, M Zolanvari, A Erbad, R Jain, K Khan… - computers & …, 2020 - Elsevier
Abstract Industrial Control System (ICS) is a general term that includes supervisory control &
data acquisition (SCADA) systems, distributed control systems (DCS), and other control …

A survey on wireless body area networks: Architecture, security challenges and research opportunities

MS Hajar, MO Al-Kadri, HK Kalutarage - Computers & Security, 2021 - Elsevier
In the era of communication technologies, wireless healthcare networks enable innovative
applications to enhance the quality of patients' lives, provide useful monitoring tools for …

Elliptic Curve Cryptography; Applications, challenges, recent advances, and future trends: A comprehensive survey

S Ullah, J Zheng, N Din, MT Hussain, F Ullah… - Computer Science …, 2023 - Elsevier
Elliptic Curve (EC) is the most recent and advanced technique of Elliptic Curve
Cryptography (ECC). EC is often used to improve the security of open communication …

Smart home-based IoT for real-time and secure remote health monitoring of triage and priority system using body sensors: Multi-driven systematic review

M Talal, AA Zaidan, BB Zaidan, AS Albahri… - Journal of medical …, 2019 - Springer
Abstract The Internet of Things (IoT) has been identified in various applications across
different domains, such as in the healthcare sector. IoT has also been recognised for its …

[PDF][PDF] Advanced encryption standard (AES) algorithm to encrypt and decrypt data

AM Abdullah - Cryptography and Network Security, 2017 - researchgate.net
(AES) algorithm is one on the most common and widely symmetric block cipher algorithm
used in worldwide. This algorithm has an own particular structure to encrypt and decrypt …

[HTML][HTML] A survey on blockchain consensus with a performance comparison of PoW, PoS and pure PoS

C Lepore, M Ceria, A Visconti, UP Rao, KA Shah… - Mathematics, 2020 - mdpi.com
Blockchain technology started as the backbone for cryptocurriencies and it has emerged as
one of the most interesting technologies of the last decade. It is a new paradigm able to …

[PDF][PDF] DES, AES and Blowfish: Symmetric key cryptography algorithms simulation based performance analysis

J Thakur, N Kumar - International journal of emerging technology and …, 2011 - academia.edu
Security is the most challenging aspects in the internet and network applications. Internet
and networks applications are growing very fast, so the importance and the value of the …

[PDF][PDF] A survey on cryptography algorithms

OG Abood, SK Guirguis - International Journal of Scientific and …, 2018 - academia.edu
DOI: 10.29322/IJSRP. 8.7. 2018. p7978 http://dx. doi. org/10.29322/IJSRP. 8.7. 2018. p7978
Abstract-With the major advancements in the field of technology and electronics, one …

Comprehensive study of symmetric key and asymmetric key encryption algorithms

MB Yassein, S Aljawarneh… - … on engineering and …, 2017 - ieeexplore.ieee.org
Cloud computing emerged in the last years to handle systems with large-scale services
sharing between vast numbers of users. It provides enormous storage for data and …