Quantum cryptography for enhanced network security: A comprehensive survey of research, developments, and future directions

MS Akter, J Rodriguez-Cardenas… - … Conference on Big …, 2023 - ieeexplore.ieee.org
With the ever-growing concern for internet security, the field of quantum cryptography
emerges as a promising solution for enhancing the security of networking systems. In this …

Systematic Literature Review on Cloud Computing Security: Threats and Mitigation Strategies

S Ahmadi - Ahmadi, S.(2024) Systematic Literature Review on …, 2024 - papers.ssrn.com
Cloud computing plays a significant role in modern information technology, providing
organizations with numerous benefits, including flexibility, scalability, and cost-efficiency …

[HTML][HTML] Role of quantum computing in shaping the future of 6 G technology

MA Akbar, AA Khan, S Hyrynsalmi - Information and Software Technology, 2024 - Elsevier
Context The emergence of 6 G technology heralds a groundbreaking era in digital
connectivity, envisaging universal and seamless links. To address the intricate …

A new offloading method in the green mobile cloud computing based on a hybrid meta-heuristic algorithm

A Almadhor, A Alharbi, AM Alshamrani… - … Informatics and Systems, 2022 - Elsevier
Abstract Mobile Cloud Computing (MCC) results from the evolution of several Internet-based
technologies that allow mobile consumers to gain cloud computing advantages and attain …

Novel quantum key distribution and attribute based encryption for cloud data security

G Verma, A Kumar - Concurrency and Computation: Practice …, 2023 - Wiley Online Library
Improvement of privacy and security in data centers is challenging with proficient safety key
managing. So as to resolve this issue, data centers require proficient quantum cryptographic …

[HTML][HTML] Mobile cloud computing: A survey on current security trends and future directions

B Sheikh, A Butt, J Hanif - Engineering Proceedings, 2023 - mdpi.com
Mobile cloud computing (MCC) is an emerging concept that is gaining popularity in the IT
sector. It is a significant topic of debate because it is being discussed as one of the most …

[HTML][HTML] Post-quantum healthcare: A roadmap for cybersecurity resilience in medical data

M SaberiKamarposhti, KW Ng, FF Chua, J Abdullah… - Heliyon, 2024 - cell.com
As healthcare systems transition into an era dominated by quantum technologies, the need
to fortify cybersecurity measures to protect sensitive medical data becomes increasingly …

An Analysis of SMS Spam Detection using Machine Learning Model

H Jain, M Mahadev - 2022 Fifth International Conference on …, 2022 - ieeexplore.ieee.org
social-media is a very common medium for spammers to unethically overwhelm normal
users with unsolicited or false content via social-networking. Now a days most of the people …

Secure Cloud Data Access: Unifying Quantum Key Distribution and Attribute-Based Encryption for Enhanced Data Protection

A Kumar, G Verma - SN Computer Science, 2023 - Springer
In today's advanced and technologically advanced world, cloud computing has emerged as
a popular platform for managing and maintaining data, information, and services worldwide …

A comprehensive survey for cryptography implementation using quantum computing

ZS Ageed, SRM Zeebaree, RK Ibrahim - AIP Conference Proceedings, 2024 - pubs.aip.org
Abstract Information is divided into two types: classical and quantum. Quantum computing,
quantum cryptography, and quantum teleportation are just a few of the miracles they can do …