Online banking user authentication methods: a systematic literature review

NA Karim, OA Khashan, H Kanaker… - Ieee …, 2023 - ieeexplore.ieee.org
Online banking has become increasingly popular in recent years, making it a target for
cyberattacks. Banks have implemented various user authentication methods to protect their …

Communication security of intelligent information service platform combining AES and ECC algorithms

B Fu, T Fang, L Zhang, Y Zhou… - Journal of Cyber Security …, 2024 - Taylor & Francis
The rapid progress of information technology has made the status of information service
platforms increasingly prominent in social operations. However, their communication …

Enhanced scalar multiplication algorithm over prime field using elliptic net

N Muslim, F Yunos, Z Razali… - Journal of Advanced …, 2024 - semarakilmu.com.my
Scalar multiplication in elliptic curve cryptography is the most expensive and time-
consuming operation. The elliptic curve cryptography attracted interest due to the …

Securing Cloud Data: A Comprehensive Review of Hybrid Cryptography and Analysis of AES, Blowfish, and Twofish Algorithms

S Sabeen - 2024 3rd International Conference on Automation …, 2024 - ieeexplore.ieee.org
Cryptography is crucial for secure cloud computing because it addresses data security
issues in shared environments, as well as the challenges that arise when companies …

[PDF][PDF] Advancing cryptographic security: a novel hybrid AES-RSA model with byte-level tokenization.

RS Durge, VM Deshmukh - International Journal of Electrical & …, 2024 - academia.edu
As cyberattacks are getting more complex and sophisticated, stringent, multi-layered security
measures are required. Existing approaches often rely on tokenization or encryption …

Integrating AES-GCM, ECC, and Steganography for Enhanced Confidential Communication

S Shrinivas, GK Varun… - … Conference on Electrical …, 2024 - ieeexplore.ieee.org
In the modern world of information and technology, the prime requirement is highly secure
data communication against the cyber threat. Efficient data communication should support …

ANCHOR: A New Proposed Stream Cipher for Smart Cards with Crypto Co-Processor

AO Elrefai, KA Shehata, HM Eldeeb… - Journal of Advanced …, 2025 - semarakilmu.com.my
A smart card is a small pocket-sized computer with limited resources used for secure data
processing and storage. The card consists of different software and hardware components …

A Comprehensive Assessment on Fortified Security Protocols: Delving into AES Algorithm, ECC, Blockchain, Cloud Computing Within a Regulatory Landscape

B Kumar, K Singh, P Banerjee, P Kumar… - … Control & Information …, 2024 - ieeexplore.ieee.org
In recent days, there have been a few techniques available on the market that can resolve
the concern for data protection and privacy. One of them is said to be cloud computing. In …