IoT cybersecurity based smart home intrusion prevention system

F James - 2019 3rd Cyber Security in Networking Conference …, 2019 - ieeexplore.ieee.org
The Internet of Things (IoT) devices are becoming more popular in various domains such as
e-Home, e-Health, e-Commerce, e-banking, e-Enterprises, e-Learning and e-Trafficking …

[HTML][HTML] Review of algorithms for securing data transmission in mobile banking

DO Orucho, FM Awuor, R Makiya, C Oduor - Modern Economy, 2023 - scirp.org
With the dawn of mobile banking applications, bank customers can now register for M-
banking and download applications that aid them to access services from the bank server …

Method of access subject authentication profile generation

A Iskhakov, R Meshcheryakov… - 2020 International …, 2020 - ieeexplore.ieee.org
It is important to note, that within the last ten years we can see considerable growth in the
number of incidents and revealed vulnerabilities as well as purposeful attacks on industrial …

Approach to Privacy Preserved Data Mining in Distributed Systems

I Anikin, R Gazimov - 2019 International Russian Automation …, 2019 - ieeexplore.ieee.org
Nowadays using data mining techniques is very important for many modern industrial
systems. They could help to decide different tasks in these systems related with decision …

[PDF][PDF] MULTI-SHAPE SYMMETRIC ENCRYPTION MECHANISM FOR NON-GENERIC ATTACKS MITIGATION

AAA Abdelgader - 2022 - core.ac.uk
Static cyphers use static transformations for encryption and decryption. Therefore, the
attacker will have some knowledge that can be exploited to construct assaults since the …

A Stealth Key Exchange Protocol

KF Rafat - Intelligent Computing: Proceedings of the 2019 …, 2019 - Springer
Cryptography, the science of secret writing, is in use since long to inarticulate the legitimate
contents to prevent their unauthorized exposure. To ensure secure communication between …

[PDF][PDF] A Comparative Analysis of Cryptographic Algorithms: AES & RSA and Hybrid Algorithm for Encryption and Decryption

P Taneja, S Kalta - academia.edu
Cryptography was provided to secure communication between two parties known as sender
and receiver in the appearance of unassigned user known as attackers with the process …

[引用][C] Koblitz Curve-A Mapping Technique to Encipher/Decipher the Text message using Elliptic Curve Cryptography

D Bhatia - Journal of Scientific Research, 2022