Secure sensitive data sharing using RSA and ElGamal cryptographic algorithms with hash functions

EA Adeniyi, PB Falola, MS Maashi, M Aljebreen… - Information, 2022 - mdpi.com
With the explosion of connected devices linked to one another, the amount of transmitted
data grows day by day, posing new problems in terms of information security, such as …

Analysis of the Cryptographic Algorithms in IoT Communications

C Silva, VA Cunha, JP Barraca, RL Aguiar - Information Systems Frontiers, 2023 - Springer
The advances on recent communication paradigms brings new security and privacy
challenges, mainly about personal data collection by smart devices. Resource constrained …

Evaluating the merits and constraints of cryptography-steganography fusion: a systematic analysis

I Haverkamp, DK Sarmah - International Journal of Information Security, 2024 - Springer
In today's interconnected world, safeguarding digital data's confidentiality and security is
crucial. Cryptography and steganography are two primary methods used for information …

Multilevel Subgranting by Power of Attorney and OAuth Authorization Server in Cyber–Physical Systems

SV Sudarsan, O Schelén… - IEEE Internet of Things …, 2023 - ieeexplore.ieee.org
Many cyber–physical systems (CPSs) are today semi-autonomous and powerful enough to
perform advanced tasks on their own. This means they can also act as representatives of …

Ensuring Information Security of Web Resources Based on Blockchain Technologies

B Aliya, U Olga, B Yenlik… - International Journal of …, 2023 - search.proquest.com
This project examines how blockchain technology can enhance data security and reliability
for web applications. In this article, ways to improve data security on online course platforms …

Design and implementation of a modified AES cryptography with fast key generation technique

S Arman, T Rehnuma… - 2020 IEEE International …, 2020 - ieeexplore.ieee.org
Cryptography is an emerging topic that has gained momentum since data explosion. With
the advent of data it has become more important to secure the data from external …

Analysis of cryptography algorithms implemented in android mobile application

A Salkanovic, S Ljubic, L Stankovic, J Lerga - Information Technology and …, 2021 - itc.ktu.lt
This paper evaluates the performances of numerous encryption algorithms on mobile
devices running the Android operating system. The primary objective of our research was to …

[PDF][PDF] Performance Comparison of Hyper-V and KVM for Cryptographic Tasks in Cloud Computing.

NA Karim, WK Abdulraheem, OA Khashan… - … , Materials & Continua, 2024 - researchgate.net
As the extensive use of cloud computing raises questions about the security of any personal
data stored there, cryptography is being used more frequently as a security tool to protect …

Mitigating the Latency Induced Delay in IP Telephony through an Enhanced De-Jitter Buffer

A Karim, E Ahmed, S Azam, B Shanmugam… - Mobile Computing and …, 2022 - Springer
IP telephony or voice over IP (VoIP) at present is promising a shining future for voice
services. There are several technical aspects which make the technology attractive; on the …

[PDF][PDF] A Study of Z-Transform Based Encryption Algorithm

MN Alenezi, FS Al-Anzi - International Journal of Communication …, 2021 - researchgate.net
It has become increasingly important to ensure the protection of information, especially data
in transit. Therefore, it is the primary goal of any encryption algorithm to safeguard …