Keyless lightweight encipher using homomorphic and binomial coefficients for smart computing applications

SA Sultana, R Ch, RP Malleswari - 2023 2nd International …, 2023 - ieeexplore.ieee.org
Globally, advanced technologies play a vital role to offer services to the user. But the major
issue raised here is that the data utilization rate increasing day by day which causes attacks …

THC-DFECC-based privacy preserved smart contract creation for cloud data security

CS Tiwari, VK Jha - International Journal of Information Technology, 2024 - Springer
Currently, cloud services have become a novel business model for information services
owing to the rapid development of Cloud Computing (CC) technology. Hence, an efficient …

Blockchain assisted encryption scheme for intellectual share estimation using medical research data

P Diwan, R Kashyap… - … and Computation: Practice …, 2024 - Wiley Online Library
Recently, blockchain utilization with advanced encryption and decryption has gained
improved attention over diverse applications. Especially in the medical field, big data …

[PDF][PDF] Honeypot Game Theory against DoS Attack in UAV Cyber.

S Miao, Y Li, Q Pan - Computers, Materials & Continua, 2023 - cdn.techscience.cn
ABSTRACT A space called Unmanned Aerial Vehicle (UAV) cyber is a new environment
where UAV, Ground Control Station (GCS) and business processes are integrated. Denial of …

Lightweight similarity checking for English literatures in mobile edge computing

X Liu, A Gao, C Chen, MM Moghimi - Journal of Cloud Computing, 2023 - Springer
With the advent of information age, mobile devices have become one of the major
convenient equipment that aids people's daily office activities such as academic research …

Security Techniques in Cyber Physical System for Pharmaceutical Care Services

S Devliyal, HR Goyal, S Sharma - 2023 IEEE International …, 2023 - ieeexplore.ieee.org
The use of information technology by the pharmaceutical sector is currently being expanded
in order to support the advancement and evolution of workable development strategies in …

Safeguarding supply chains from cyber-physical system attacks frameworks and strategies

MO Ibiyemi, DO Olutimehin - International Journal of Management & …, 2024 - fepbl.com
This review paper delves into the escalating challenge of safeguarding supply chains
against cyber-physical system (CPS) attacks, emphasizing the critical role of CPS in modern …

[PDF][PDF] Preserving Confidential Data Using Improved Rivest-Shamir Adleman to Secure Multi-Cloud.

HNB Manjyanaik, R Mohanty… - International Journal of …, 2024 - researchgate.net
Multi-cloud security is a comprehensive cloud security solution that protects applications and
data through various platforms. Multi-cloud security contains public and private clouds like …

Enhancing the Security of Cryptographic Algorithms in Cloud-Based Cyber-Physical Systems (CCPSs)

MS Jawed, M Sajid, M Lapina… - Intelligent Techniques for …, 2023 - taylorfrancis.com
Data security has become one of the biggest hurdles in the adoption of cloud-based cyber-
physical systems (CCPSs), as CCPS is directly associated with the user's private data …

Exploring Parallels Between Islamic Theology and Technological Metaphors

A Younas, Y Zeng - Available at SSRN 4807191, 2024 - papers.ssrn.com
As the scope of innovative technologies is expanding, their implications and applications are
increasingly intersecting with various facets of society, including the deeply rooted traditions …