Systematic and critical review of rsa based public key cryptographic schemes: Past and present status

R Imam, QM Areeb, A Alturki, F Anwer - IEEE access, 2021 - ieeexplore.ieee.org
The interconnected digital world is generating enormous data that must be secured from
unauthorized access. Advancement in technologies and new innovative methods applied by …

AI-empowered, blockchain and SDN integrated security architecture for IoT network of cyber physical systems

SA Latif, FBX Wen, C Iwendi, FW Li-Li… - Computer …, 2022 - Elsevier
Internet of things (IoT) is one of the most emerging technologies nowadays and it is one of
the key enablers of industrial cyber physical system (CPSs). It has started to participate in …

Post‐quantum cryptography techniques for secure communication in resource‐constrained Internet of Things devices: A comprehensive survey

S Kumari, M Singh, R Singh… - Software: Practice and …, 2022 - Wiley Online Library
As the number and characteristics of smart devices change, the concept of the Internet of
Things (IoT) emerges. The IoT provides the connected devices with a variety of resources …

[HTML][HTML] Effective and efficient DDoS attack detection using deep learning algorithm, multi-layer perceptron

S Ahmed, ZA Khan, SM Mohsin, S Latif, S Aslam… - Future Internet, 2023 - mdpi.com
Distributed denial of service (DDoS) attacks pose an increasing threat to businesses and
government agencies. They harm internet businesses, limit access to information and …

An effective and enhanced RSA based public key encryption scheme (XRSA)

R Imam, F Anwer, M Nadeem - International Journal of Information …, 2022 - Springer
Cryptography is the mechanism of providing significant security services such as
confidentiality, authentication, and integrity. These services are essentially more important in …

[HTML][HTML] Evaluating deep learning variants for cyber-attacks detection and multi-class classification in IoT networks

S Abbas, I Bouazzi, S Ojo, A Al Hejaili… - PeerJ Computer …, 2024 - peerj.com
Abstract The Internet of Things (IoT), considered an intriguing technology with substantial
potential for tackling many societal concerns, has been developing into a significant …

Revolutionizing modern networks: advances in AI, machine learning, and blockchain for quantum satellites and UAV-based communication

A Kumar, R Krishnamurthi, G Sharma, S Jain… - arXiv preprint arXiv …, 2023 - arxiv.org
Quantum communication is the most secure technique of transmitting data available today.
Fiber communication lines and satellite-to-ground links have served as the basis for the …

A review of the present cryptographic arsenal to deal with post-quantum threats

G Yalamuri, P Honnavalli, S Eswaran - Procedia Computer Science, 2022 - Elsevier
The looming threat of quantum attacks on the digital infrastructure protected by conventional
cryptographic protocol has generated urgency in identifying and deploying …

An Improved Public Key Cryptographic Algorithm Based on Chebyshev Polynomials and RSA

C Zhang, Y Liang, A Tavares, L Wang, T Gomes… - Symmetry, 2024 - mdpi.com
Due to its very desirable properties, Chebyshev polynomials are often used in the design of
public key cryptographic systems. This paper discretizes the Chebyshev mapping …

Hybrid Quantum Computing and Decision Tree-Based Data Mining for Improved Data Security

K Sudharson, NS Usha, G Babu… - 2023 7th …, 2023 - ieeexplore.ieee.org
Data mining and quantum computing have become potent methods for analyzing massive
datasets and gaining insightful conclusions. However, conventional techniques for data …