A Novel Pyra-Cryptosystem Relying Secure Light-Weight Data Exchange, Peer-to-Peer Authentication, and Secure Communication Session Key Management …

A Attkan, P Ahlawat, V Ranga - SN Computer Science, 2025 - Springer
Abstract The Internet of Things has such a huge domain of applications that it is very
common to locate any IoT device, when we look around the technological things working …

Formal Analysis of Julia Key Agreement Protocol

N Sivaraman, S Nadjm-Tehrani… - … Conference on Information …, 2024 - Springer
The evolution of the fifth-generation network (5G) increases the demand and use of Internet
of Things (IoT) devices extensively. The increased number of IoT devices increases the …

Secure Electronic Transaction Based Framework for Evidence Transportation in Network Forensics

S Bhardwaj, M Dave - … IEEE 7th Conference on Information and …, 2023 - ieeexplore.ieee.org
This research article outlines a detailed framework for implementing Secure Electronic
Transactions (SET) in the field of network forensics. The framework is designed to guarantee …

A Compact Hardware Design and Implementation on FPGA Based Hybrid of AES and Keccak SHA3-512 for Enhancing Data Security

KJ Lakshmi, G Sreenivasulu - International Journal of …, 2024 - ijeer.forexjournal.co.in
Data security means protecting important information from unauthorised persons. In a
security system, cryptography is the most secure method. Cryptography has many kinds, but …