Z Rui, Z Yan - IEEE access, 2018 - ieeexplore.ieee.org
In order to overcome the difficulty of password management and improve the usability of authentication systems, biometric authentication has been widely studied and has attracted …
Information security and confidentiality are the prime concern of any type of communication. Rapidly evolution of technology recently, leads to increase the intruder's ability and a main …
Networks have evolved very rapidly, which allow secret data transformation speedily through the Internet. However, the security of secret data has posed a serious threat due to …
SC Sukumaran, M Misbahuddin - Int. J. Netw. Secur., 2018 - ijns.jalaxy.com.tw
Cloud computing has revolutionized the way the data is stored, processed and made available. It has evolved in various forms of utility computing by sharing resources …
Current researchers have focused on DNA-based cryptography, in fact, DNA or deoxyribonucleic acid, has been applied in cryptography for performing computation as well …
X Jin, X Duan, H Jin, Y Ma - Entropy, 2020 - mdpi.com
Aiming at the problems of small key space, low security of encryption structure, and easy to crack existing image encryption algorithms combining chaotic system and DNA sequence …
Biomedical image analysis is an integral part of the modern healthcare industry and has a huge impact on the modern world. Automated computer-aided systems are highly beneficial …
SC Sukumaran, M Misbahuddin - … of King Saud University-Computer and …, 2021 - Elsevier
Cloud computing technology got relevance as computing paradigm, which delivers massively scalable computing technologies based on the Internet for the organizations …
M Poriye, S Upadhyaya - Wireless Personal Communications, 2023 - Springer
The current status of DNA cryptography (biological) is much far away from real scenario and can be carried out by only using chemical reactions in biological based laboratory. The …