A comprehensive literature of genetics cryptographic algorithms for data security in cloud computing

O Can, F Thabit, AO Aljahdali, S Al-Homdy… - Cybernetics and …, 2023 - Taylor & Francis
Cloud computing has revolutionized the world, opening up new horizons with bright
potential due to its performance, accessibility, low cost, and many other benefits. Cloud …

An image encryption algorithm based on 6-dimensional hyper chaotic system and DNA encoding

Q Li, L Chen - Multimedia Tools and Applications, 2024 - Springer
Image encryption algorithm based on chaos has been widely used in various industries, but
many image encryption algorithms based on low-dimensional chaos, resulting in the …

[PDF][PDF] DNA based cryptography: a review

AK Kaundal, AK Verma - International Journal of Information and …, 2014 - academia.edu
ABSTRACT DNA cryptography is a novel field being taken up for research by the researcher
community in order to have secure communication on a network. This technique is inspired …

Data security techniques based on DNA encryption

M Roy, S Chakraborty, K Mali, R Swarnakar… - … of International Ethical …, 2020 - Springer
Security of the digital data is one of the major concerns of the today's world. There are
several methods for digital data security that can be found in the literature. Biological …

Dna-based cryptographic method for the internet of things

A Khobzaoui, K Benyahia, B Mansouri… - International Journal of …, 2022 - igi-global.com
Abstract Internet of Things (IoT) is a set of connected smart devices providing and sharing
rich data in real-time without involving a human being. However, IoT is a security nightmare …

Fuzzy based energy efficient underwater routing protocol

S Sahana, K Singh - Journal of Discrete Mathematical Sciences …, 2019 - Taylor & Francis
The routing protocol in the underwater wireless sensor network is very challenging over the
traditional network. Sensor nodes are placed in a specified location with their limited energy …

[PDF][PDF] Security issues in MANET: a survey on attacks and defense mechanisms

T Bhatia, AK Verma - International Journal, 2013 - researchgate.net
Mobile Adhoc NETwork (MANET) is a collection of mobile nodes which can communicate
directly with other nodes within its transmission range and use multihop routing for nodes …

Mobile ad hoc network (MANET) proactive and reactive routing protocols

SA Alasadi, AA Al-Joda, EF Abdullah - Journal of Discrete …, 2021 - Taylor & Francis
An ad hoc mobile network can be defined as a set of communication hosts that are linked
together with no predetermined topology of wireless links and also without the need for a …

A bio-inspired algorithm for symmetric encryption

K Benyahia, M Mustapha, L Abdelkrim - Research Anthology on …, 2021 - igi-global.com
The exploits of the structure of the DNA to realize the cryptographic systems is a new
direction. The security of data transfer is an important factor for data transmission …

Extending feistel structure to DNA cryptography

AK Kaundal, AK Verma - Journal of Discrete Mathematical …, 2015 - Taylor & Francis
DNA cryptography is a novel field being taken up by the researcher community for research
now days in order to have secure communication on a network. This technique is inspired …