Comparative analysis of cryptographic algorithms in context of communication: A systematic review

S Ahmed, T Ahmed - International Journal of Scientific and …, 2022 - repository.uel.ac.uk
Currently, there are billions of IoT devices connected to each other through the internet, and
manufacturers and IT engineers are using modern cryptographic tools to protect the …

A new approach to hiding data in the images using steganography techniques based on AES and RC5 algorithm cryptosystem

MS Hossen, MA Islam, T Khatun… - … on Smart Electronics …, 2020 - ieeexplore.ieee.org
In the new era of modern science and technology is developing day by day, data
confidentiality is risky, all over the world and it increases rapidly. In this paper, a new …

[HTML][HTML] Review of algorithms for securing data transmission in mobile banking

DO Orucho, FM Awuor, R Makiya, C Oduor - Modern Economy, 2023 - scirp.org
With the dawn of mobile banking applications, bank customers can now register for M-
banking and download applications that aid them to access services from the bank server …

Digital signature with message security process

SS Chauhan, N Jain, SC Pandey - 2022 2nd International …, 2022 - ieeexplore.ieee.org
This is the time of internet, and we are communicating our confidential data over internet in
daily life. So, it is necessary to check the authenticity in communication to stop non …

[HTML][HTML] Providing Security for Flash Loan System Using Cryptocurrency Wallets Supported by XSalsa20 in a Blockchain Environment

M Al-Zubaidie, WA Jebbar - Applied Sciences, 2024 - mdpi.com
The days of long lines at banks and piles of paperwork are long gone. The lending
landscape has been completely transformed by digital loans, which provide a quick, easy …

Attribute-based adaptive homomorphic encryption for big data security

R Thenmozhi, S Shridevi, SN Mohanty, V García-Díaz… - Big Data, 2021 - liebertpub.com
There is a drastic increase in Internet usage across the globe, thanks to mobile phone
penetration. This extreme Internet usage generates huge volumes of data, in other terms, big …

A quantum key injection scheme for mobile terminals based on commercial quantum key distribution

X Li, D Zhu, J Wu, H Wang, L Yang… - International Journal of …, 2022 - inderscienceonline.com
In order to satisfy the demand of mobile secure communication for quantum keys, this study
proposes a commercial quantum key distribution (QKD) based quantum key injection …

An online E-Cash scheme with digital signature authentication cryptosystem

M Ashiqul Islam, M Sagar Hossen, M Hossain… - … : Proceedings of ICSCN …, 2021 - Springer
This paper is intended to enlighten the curious minds on how to use cryptocurrency easily in
our day-to-day life. What bitcoin really is? The relation between bank and the user, who has …

A multi-layer cryptosystem for secure data transmission using PRNG

MA Islam, MS Sarker, MS Hossen… - 2020 3rd …, 2020 - ieeexplore.ieee.org
Nowadays the usage of the Internet is developing day by day. One of the largest uses of the
internet is to transfer data from different sources to different states. During data transfer over …

Multi Level Bank Locker Security System with Digital Signature Authentication and Internet of Things

MA Islam, MS Sarder, MH Mamun, F Ahmed, SK Sarkar… - 2022 - researchsquare.com
Recently bank security is being a matter of great awareness and importance in the world.
Though, we designed a multi-layer Bank security system to preserve the bank locker from …