Optimized key generation-based privacy preserving data mining model for secure data publishing

YR Kulkarni, B Jagdale, SR Sugave - Advances in Engineering Software, 2023 - Elsevier
The data from the mobile devices and internet services plays a significant role now a day.
The information shared needs to be original to get the best solution. Without the utilization of …

Secret dynamic key authentication and decision trust secure routing framework for internet of things based WSN

U Meena, P Sharma - Wireless Personal Communications, 2022 - Springer
Abstract Internet of Things (IoT) devices has risen drastically due to the advancement of
Information and communication technologies. Wireless sensor network (WSN) performs a …

A Novel Intelligent AI-based Security to Enhance the Data Communication

A Shaik, BT Hung, P Chakrabarti - International Journal of Intelligent …, 2023 - ijisae.org
In this work, we propose a novel known as matrix translation and Elliptic curve cryptography
(MT-ECC) approach for secured data communication in IoT network systems. The proposed …

Symmetric key and polynomial-based key generation mechanism for secured data communications in 5G networks

S Pradeep, S Muthurajkumar, S Ganapathy, A Kannan - Soft Computing, 2024 - Springer
Fifth Generation (5G) networks provide data communications through various latest
technologies including Software Defined Networks (SDN), Artificial Intelligence, Machine …

An Effective Data Security Mechanism for Secured Data Communications Using Hybrid Cryptographic Technique and Quantum Key Distribution

J Sivakumar, S Ganapathy - Wireless Personal Communications, 2023 - Springer
One of the most flamboyant technological novelties of today's world is cloud computing,
which has been fuelled by the increase in the number of smart devices across the internet …

[PDF][PDF] A New Security Mechanism for Secured Communications Using Steganography and CBA

AA AB, A Gupta, S Ganapathy - ECTI Transactions on Computer …, 2022 - thaiscience.info
Article information: The quick advancement of computerized information trade has caused
data security to be of much significance in information transmission. As a huge measure of …

A comparison among fast point multiplication algorithms in elliptic curve cryptosystem

S Padhy, TN Shankar, S Dash - 2022 - researchsquare.com
Abstract In the Elliptic Curve Cryptosystem, the multiplication of points is essential in the
successful computation of any operation. Reduction of time complexity for the mathematical …

A Secured Storage and Communication System for Cloud Using ECC, Polynomial Congruence and DSA

J Nithisha, P Jesu Jayarin - Wireless Personal Communications, 2022 - Springer
Security is necessary for performing the effective data communications in internet and cloud
environment. The data security in cloud is becoming very challenging task due to the …

UDP flooding attack detection using entropy in software-defined networking

S Muthurajkumar, A Geetha, S Aravind… - … on Communication and …, 2022 - Springer
Software-defined networking (SDN) is one of the most emerging technologies in the recent
years. It is the physical separation of the network control plane from the data plane in the …

A Novel Intelligent AI-Based Security to Enhance the Data Communication: An Empirical Review

A Shaik, BT Hung, P Chakrabarti… - … on Intelligent Systems …, 2022 - Springer
The transmission of digital data between two devices is termed data communication. As the
world nowadays relies on digital communication, the transferring of data among various …