A comparative analysis of arabic text steganography

R Thabit, NI Udzir, SM Yasin, A Asmawi, NA Roslan… - Applied Sciences, 2021 - mdpi.com
Protecting sensitive information transmitted via public channels is a significant issue faced
by governments, militaries, organizations, and individuals. Steganography protects the …

[PDF][PDF] Post-Quantum Cryptographic Schemes for Security Enhancement in 5G and B5G (Beyond 5G) Cellular Networks

S Bhatt, B Bhushan, T Srivastava, VS Anoop - 5G and Beyond, 2023 - library.oapen.org
Abstract 5G is the fifth generation of broadband cellular network and beyond 5G can be the
6G, which will be the sixth generation of broadband cellular network. Even though studies …

[PDF][PDF] IMPLEMENTING SECURITY IN IOT ECOSYSTEM USING 5G NETWORK SLICING AND PATTERN MATCHED INTRUSION DETECTION SYSTEM: A …

A Jain, T Singh, SK Sharma, V Prajapati - Interdisciplinary Journal of …, 2021 - ijikm.org
ABSTRACT Aim/Purpose 5G and IoT are two path-breaking technologies, and they are like
wall and climbers, where IoT as a climber is growing tremendously, taking the support of 5G …

Self-Monitoring Obfuscated IoT Network

A Biswas, D Das, S Bhattacharyya - Security and Organization …, 2020 - taylorfrancis.com
Internet of Things (IoT) has made automation cheaper and widespread, and future cities will
be heavily dependent on it. Although IoT has made our life easier by providing hassle-free …

[引用][C] Secure Audio Conversation by Steganography Based on Diffie–Hellman and One-time pad

D Rahbari, Y Farjami… - IT Cost …, 2017 - IT Cost Management Strategies