A survey of blockchain-based IoT eHealthcare: Applications, research issues, and challenges

MS Rahman, MA Islam, MA Uddin, G Stea - Internet of Things, 2022 - Elsevier
Blockchain (BC) technology has recently emerged as an essential component for different
applications, including healthcare and IoT, because of its decentralized ledger, source …

Robust and lightweight symmetric key exchange algorithm for next-generation IoE

Z Ashraf, A Sohail, M Yousaf - Internet of Things, 2023 - Elsevier
Abstract The Internet of Everything (IoE) is a multi-domain environment where millions of
people and smart devices are connected and communicate with each other. IoE demands …

A new approach to hiding data in the images using steganography techniques based on AES and RC5 algorithm cryptosystem

MS Hossen, MA Islam, T Khatun… - … on Smart Electronics …, 2020 - ieeexplore.ieee.org
In the new era of modern science and technology is developing day by day, data
confidentiality is risky, all over the world and it increases rapidly. In this paper, a new …

SG-Audit: An Efficient and Robust Cloud Auditing Scheme for Smart Grid

N Lu, M Liu, W Shi, X Liu… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
Cloud auditing allows users to leverage digital signature evidences to undertake remote
data verification and consequently determine the integrity of their data stored in the cloud …

Cloud computing platform: Performance analysis of prominent cryptographic algorithms

A Ajmal, S Ibrar, R Amin - Concurrency and Computation …, 2022 - Wiley Online Library
With advancements in science and technology, cloud computing is the next big thing in the
industry. Cloud cryptography is a technique that uses encryption algorithms to secure data …

Digital signature with message security process

SS Chauhan, N Jain, SC Pandey - 2022 2nd International …, 2022 - ieeexplore.ieee.org
This is the time of internet, and we are communicating our confidential data over internet in
daily life. So, it is necessary to check the authenticity in communication to stop non …

[HTML][HTML] A Novel Two-Factor Authentication Scheme for Increased Security in Accessing the Moodle E-Learning Platform

V Baneş, C Ravariu, B Appasani, A Srinivasulu - Applied Sciences, 2023 - mdpi.com
Moodle is a platform designed for universal learning to support pedagogical interactions and
educational activities. The information technology (IT) administrator uses standard …

Security Evaluation of Different Hashing Functions with RSA for Digital Signature

M Badawy - IJCI. International Journal of Computers and …, 2023 - journals.ekb.eg
The emergence of the Internet of Things (IoT) represents a significant trend, where
integrating IP, data, and wireless technologies onto a single network yields substantial …

An online E-Cash scheme with digital signature authentication cryptosystem

M Ashiqul Islam, M Sagar Hossen, M Hossain… - … : Proceedings of ICSCN …, 2021 - Springer
This paper is intended to enlighten the curious minds on how to use cryptocurrency easily in
our day-to-day life. What bitcoin really is? The relation between bank and the user, who has …

A robust hybrid algorithm for medical image cryptography using patient biometrics based on DNA and RNA computing

M Soltani, H Shakeri, M Houshmand - 2023 - researchsquare.com
In the new age, most medical digital imaging and media objects (DICOMs) contain images
and related medical and demographic information about the patients, which must be kept …