Chaotic-map based encryption for 3D point and 3D mesh fog data in edge computing

KR Raghunandan, R Dodmane, K Bhavya… - IEEE …, 2022 - ieeexplore.ieee.org
Recent decades have seen dramatic development and adoption of digital technology. This
technological advancement generates a large amount of critical data that must be …

CASDC: a cryptographically secure data system based on two private key images

A Al-Hyari, I Al-Taharwa, B Al-Ahmad, Z Alqadi - IEEE Access, 2022 - ieeexplore.ieee.org
Colored digital images are one of the most important types of digital data to be used in many
vital applications, which require a safe way to protect them from hacking operations and the …

Survey of applications, advantages, and comparisons of AES encryption algorithm with other standards

BL Ananya, V Nikhitha, S Arjun… - International Journal of …, 2023 - milestoneresearch.in
Nowadays data sharing over the internet is a major and critical issue due to security
problems. So more security mechanisms are required to protect the data while sharing …

Performance evaluation of lightweight cryptographic algorithms for heterogeneous IoT environment

M Jammula, VM Vakamulla… - Journal of Interconnection …, 2022 - World Scientific
Internet-of-Things (IoT) is an advanced intelligent infrastructure, which is formed by using
multiple self-organizing devices. Here, the devices are utilized to examine the network and …

Encryption Techniques and Algorithms to Combat Cybersecurity Attacks: A Review

SA Wadho, AF Meghji, A Yichiet, R Kumar… - … on Computer Sciences, 2023 - vfast.org
The danger of cyber-attacks is constant in the current digital environment. The necessity for
effective security actions are more crucial than ever before due to the increasingly complex …

Optimizing cryptographic protocols against side channel attacks using WGAN-GP and genetic algorithms

P Singh, P Pranav, S Dutta - Scientific Reports, 2025 - nature.com
This research introduces a novel hybrid cryptographic framework that combines traditional
cryptographic protocols with advanced methodologies, specifically Wasserstein Generative …

Honey2fish-a hybrid encryption approach for improved password and message security

S Jain, CH Muntean, R Verma - … 9th Intl Conference on Big Data …, 2023 - ieeexplore.ieee.org
Nowadays, there is an upsurge in reliance on web usage. Many of these web applications
make use of password-based authentication. Ensuring a secure password protection …

SSDTutor: A feedback-driven intelligent tutoring system for secure software development

DKP Newar, R Zhao, H Siy, LK Soh, M Song - Science of Computer …, 2023 - Elsevier
Abstract Application Programming Interfaces (APIs) in cryptography typically impose
concealed usage constraints. The violations of these usage constraints can lead to software …

Cloud Cryptography: A Cutting-Edge Method to Protect Your Cloud

R Aryan, R Bathla, S Vats… - 2023 6th International …, 2023 - ieeexplore.ieee.org
Cloud computing has revolutionized the way data is stored, processed, and accessed.
However, it also introduces new security challenges, making the protection of sensitive data …

Intensity-based randomised image steganography technique with novel AES encryption

R Shirole, SMG Swamy - International Journal of …, 2024 - inderscienceonline.com
In the present digital age, data is the currency of any organisation. Microsoft Word is the
most popular word processor. To protect the word document, many password-based …