A review paper on cryptography

AM Qadir, N Varol - … on digital forensics and security (ISDFS), 2019 - ieeexplore.ieee.org
With the internet having reached a level that merges with our lives, growing explosively
during the last several decades, data security has become a main concern for anyone …

Intelligent adaptive optimisation method for enhancement of information security in IoT-enabled environments

SP Singh, Y Alotaibi, G Kumar, SS Rawat - Sustainability, 2022 - mdpi.com
The usage of the Internet increased dramatically during the start of the twenty-first century,
entangling the system with a variety of services, including social media and e-commerce …

Cryptography: Recent research trends of encrypting mathematics

RJ Kikani, K Verma, R Navalakhe, G Shrivastava… - Materials Today …, 2022 - Elsevier
In today's world where technology and mathematics are progressing hand in hand there are
so many things to be considered and thought of when it comes to network security …

Rise and rise of blockchain: A patent statistics approach to identify the underlying technologies

PC Bhatt, V Kumar, TC Lu, RLT Cho, KK Lai - Intelligent Information and …, 2020 - Springer
Researchers have always tried to identify the technological evolution of any particular
technology with the help of patent statistics. Blockchain is one such technology which …

Secure MIMO visible light communication system based on user's location and encryption

FIK Mousa, N Al Maadeed, K Busawon… - Journal of Lightwave …, 2017 - opg.optica.org
Visible light communication systems are rapidly growing research areas with wide
applications ranging from illumination and data communication. To achieve high data rates …

[PDF][PDF] Analysis of cryptographic algorithms for network security

K Acharya, M Sajwan, S Bhargava - International Journal of …, 2013 - academia.edu
Cryptography plays a major role in securing data. It is used to ensure that the contents of a
message are confidentially transmitted and would not be altered. Network security is most …

[PDF][PDF] A New Security Mechanism for Secured Communications Using Steganography and CBA

AA AB, A Gupta, S Ganapathy - ECTI Transactions on Computer …, 2022 - thaiscience.info
Article information: The quick advancement of computerized information trade has caused
data security to be of much significance in information transmission. As a huge measure of …

Investigation of data encryption impact on broadcasting visible light communications

F Mousa, TT Son, A Burton, H Le Minh… - … Systems, Networks & …, 2014 - ieeexplore.ieee.org
This paper investigates the impact of data encryption and decryption in indoor broadcasting
visible light communications (VLC) system embedded in the physical layer. The RSA …

Cryptography using blowfish algorithm

S Sharma, KN Patel, AS Jha - 2021 3rd International …, 2021 - ieeexplore.ieee.org
Security of data whether it is personal, professional or organizational from various attackers
in today's world has become a very tough task. One of the easiest ways to protect the data is …

An In-Depth Comparative Analysis of Cryptographic Techniques for Ensuring Data Privacy in E-Applications

S Zubair, HMA Ahmed - 2024 3rd International Conference for …, 2024 - ieeexplore.ieee.org
Cryptography, dedicated to the exploration of secure communication techniques, spans a
spectrum of deployment, incorporating diverse encryption methods that range from …