[HTML][HTML] A deep stochastical and predictive analysis of users mobility based on Auto-Regressive processes and pairing functions

P Fazio, M Mehic, M Voznak - Journal of Network and Computer …, 2020 - Elsevier
With the proliferation of connected vehicles, new coverage technologies and colossal
bandwidth availability, the quality of service and experience in mobile computing play an …

RETRACTED ARTICLE: Behavior based fuzzy security protocol for wireless networks

R Menaka, R Ramesh, R Dhanagopal - Journal of Ambient Intelligence …, 2021 - Springer
Wireless networks are inevitable constituents of the present communication world. The
applications of wireless networks are numerous from fundamental communication …

A novel triple DES to enhance E-governance security

IRS Reddy, G Murali - 2017 International Conference on Energy …, 2017 - ieeexplore.ieee.org
Rapid deployment of e-governance applications highlighting on need for security and
authentication. Many emerging technologies are being developed to fulfill security …

[PDF][PDF] The proposed development of prototype with secret messages model in Whatsapp chat

H Hamdani, H Ismanto, AQ Munir… - International Journal of …, 2018 - academia.edu
Development of prototype at data security through secret messages is needed for disguising
the messages sent in smartphone chatting application, WhatsApp (WA) Chat. We propose a …

Revolutionizing Data Security and Performance with Reverse Swap Index Shifting (RSIS): An Innovative Approach to Cryptographic Algorithms

G Vijayaraj - 2024 3rd International Conference on Artificial …, 2024 - ieeexplore.ieee.org
In the face of escalating privacy concerns in our digital era, addressing existing challenges
becomes imperative. Presently, conventional hashing algorithms fall short of ensuring both …

[PDF][PDF] Enhancement in data security and integrity using minhash

LW Sa'ed Abed, G Aldamkhi, K Hadi - Indonesian Journal of …, 2021 - academia.edu
Data encryption process and key generation techniques protect sensitive data against any
various attacks. This paper focuses on generating secured cipher keys to raise the level of …

A new mobility samples encoding scheme based on pairing functions and data analytics

P Fazio, M Mehic, P Partila, J Tovarek… - 2020 IEEE/ACM 24th …, 2020 - ieeexplore.ieee.org
In the modern telecommunication systems, mobility is one of the key advantage of wireless
communications, given that it is possible to transmit/receive data, without caring of having a …

Random Alpha Hybrid Encryption and Decryption Algorithm

VVN Akhilesh, MDP Reddy, C Srivatsa… - … and Cyber Security …, 2020 - ieeexplore.ieee.org
Data breach is a major concern in the current world-wide heterogeneous networks. Data can
be forged, stolen or damaged during or after transmission. Hence, data security irrespective …