Privacy preserving three-factor authentication protocol for secure message forwarding in wireless body area networks

VO Nyangaresi - Ad Hoc Networks, 2023 - Elsevier
Wireless body area networks have gained popularity due to their ability to enhance
efficiency, flexibility, convenience and the quality of life. In this environment, the patient …

FPGA realization of a reversible data hiding scheme for 5G MIMO-OFDM system by chaotic key generation-based paillier cryptography along with LDPC and its side …

FH Shajin, P Rajesh - Journal of Circuits, Systems and Computers, 2022 - World Scientific
Multiple-Input and Multiple-Output (MIMO) technology is a significant and timely subject,
which is highly motivated by the needs of 5G wireless communications. Data transmission …

A full privacy-preserving distributed batch-based certificate-less aggregate signature authentication scheme for healthcare wearable wireless medical sensor networks …

OBJ Rabie, S Selvarajan, T Hasanin… - International Journal of …, 2024 - Springer
The dynamic connectivity and functionality of sensors has revolutionized remote monitoring
applications thanks to the combination of IoT and wireless sensor networks (WSNs) …

Enhanced authentication security for IoT client nodes through T-ECDSA integrated into MQTT broker

JJ Puthiyidam, S Joseph, B Bhushan - The Journal of Supercomputing, 2024 - Springer
Advancements in computing and communication technology have increased the number of
devices connected to the Internet, leading to the emergence of the Internet of Things (IoT) …

Project management for cloud compute and storage deployment: B2b model

J Tanwar, T Kumar, AA Mohamed, P Sharma, S Lalar… - Processes, 2022 - mdpi.com
This paper explains the project's objectives, identifies the key stakeholders, defines the
project manager's authority and provides a preliminary breakdown of roles and …

[PDF][PDF] A multilayer model to enhance data security in cloud computing

WA Awadh, AS Alasady, MS Hashim - Indonesian Journal of …, 2023 - academia.edu
Cloud computing has introduced substantial advancements to the field of information
technology, offering businesses enhanced features, flexibility, reliability, scalability, and a …

Enhancement of NTSA secure communication with one-time pad (OTP) in IoT

AHA Alattas, MA Al-Shareeda, S Manickam, MA Saare - Informatica, 2023 - informatica.si
Abstract Internet of Things (IoT) systems use interconnected devices with limited processing,
memory, storage, and power availability. Designing the IoT system requires careful …

Cloud computing platform: Performance analysis of prominent cryptographic algorithms

A Ajmal, S Ibrar, R Amin - Concurrency and Computation …, 2022 - Wiley Online Library
With advancements in science and technology, cloud computing is the next big thing in the
industry. Cloud cryptography is a technique that uses encryption algorithms to secure data …

Emerging Technologies in the Fight Against Drug Counterfeiting-A Survey of Security Measures

BS Teja, BC Sri, G Vindya… - 2023 16th International …, 2023 - ieeexplore.ieee.org
Drug counterfeiting poses a significant challenge on a global scale. Countless lives are lost
every year due to the distribution and consumption of fake medicines. Traditional …

Cryptography: Against AI and QAI Odds

S Harris, HJ Hadi, U Zukaib - arXiv preprint arXiv:2309.07022, 2023 - arxiv.org
Artificial Intelligence (AI) presents prodigious technological prospects for development,
however, all that glitters is not gold! The cyber-world faces the worst nightmare with the …