An exhaustive survey on security and privacy issues in Healthcare 4.0

JJ Hathaliya, S Tanwar - Computer Communications, 2020 - Elsevier
The healthcare industry has revolutionized from 1.0 to 4.0 where Healthcare 1.0 was more
doctor centric and Healthcare 2.0 replaced manual records with electronic healthcare …

A lightweight blockchain-based framework for medical cyber-physical system

A Kumar, K Chatterjee - The Journal of Supercomputing, 2023 - Springer
A medical cyber-physical system (MCPS) combines intelligent medical devices with a
network. Nowadays, MCPS is extensively used in the healthcare system. While sharing …

Cryptography using multinacci block matrices

M Kumari, J Tanti - International Journal of Nonlinear Analysis …, 2023 - ijnaa.semnan.ac.ir
In this paper, we propose public key cryptography using recursive block matrices involving
generalized Fibonacci numbers over a finite field Zp. For this, we define multinacci block …

Hill cipher modification: A simplified approach

JR Paragas, AM Sison… - 2019 IEEE 11th …, 2019 - ieeexplore.ieee.org
Most people nowadays are using the internet as a means of communication to facilitate
exchanging sensitive data. Securing this data is vital considering almost all computers in the …

[PDF][PDF] Modified Hill Cipher Algorithm using Myszkowski Transposition to address Known-Plaintext attack

RG Barrieta, AS Canlas, DMA Cortez… - International Journal for …, 2022 - academia.edu
Hill Cipher algorithm is a Polygraphic cipher known to be vulnerable to the Known-Plaintext
attack. It is a type of attack wherein the attacker has access to a pair of Plaintext and …

An In-Depth Comparative Analysis of Cryptographic Techniques for Ensuring Data Privacy in E-Applications

S Zubair, HMA Ahmed - 2024 3rd International Conference for …, 2024 - ieeexplore.ieee.org
Cryptography, dedicated to the exploration of secure communication techniques, spans a
spectrum of deployment, incorporating diverse encryption methods that range from …

A Comprehensive Analysis on using Multifactor Authentication System for Three Level Security

R Kantipudi, ASK Mallavarapu… - … on Intelligent Data …, 2024 - ieeexplore.ieee.org
In the era of digitalization, authentication is a vital part of modern society's security. Multi-
factor authentication (MFA) is a vital solution that offers fast, simple, and trustworthy …

An enhanced cryptographic algorithm in securing healthcare medical records

JR Paragas - 2020 Third International Conference on …, 2020 - ieeexplore.ieee.org
E-health is used in a variety of digital technologies. The internet, for example, enables users
of e-health to connect to health workers via e-mail, access medical records, examine health …

Elliptical Curve Cryptography for Images Using Fractal Based Multiple Key Hill Cipher

K Kedarisetti, R Gamini… - 2018 Second …, 2018 - ieeexplore.ieee.org
Ever since the evolution of time, there have been changes in the transmission and storage of
images, but the only constants are the security issues that came along. Eavesdropping is the …

Exploring Unique Techniques to Preserve Confidentiality and Authentication

M Asmitha, SM Rajgopal - 2024 2nd International Conference …, 2024 - ieeexplore.ieee.org
In the realm of interconnected networks, effective security measures are essential for an
increase in digital and networked society. The dangers linked to cyberattacks intensify as …