Ensuring privacy and confidentiality of cloud data: A comparative analysis of diverse cryptographic solutions based on run time trend

JK Dawson, T Frimpong, JB Hayfron Acquah… - Plos one, 2023 - journals.plos.org
The cloud is becoming a hub for sensitive data as technology develops, making it
increasingly vulnerable, especially as more people get access. Data should be protected …

Automatic COVID-19 pneumonia diagnosis from x-ray lung image: A Deep Feature and Machine Learning Solution

MA Ahmed, ZT Al-Qaysi, ML Shuwandy… - Journal of Physics …, 2021 - iopscience.iop.org
Coronavirus disease 2019 was announced after unidentified pneumonia was discovered in
Wuhan, China, and quickly spread around the world (COVID-19). This outbreak has claimed …

[HTML][HTML] Enhancing Syslog Message Security and Reliability over Unidirectional Fiber Optics

AA Anton, P Csereoka, EA Capota, RD Cioargă - Sensors, 2024 - mdpi.com
Standard log transmission protocols do not offer a robust way of segregating the log network
from potential threats. A secure log transmission system and the realization of a data diode …

Measuring avalanche properties on RC4 stream cipher variants

EJ Madarro-Capó, CM Legón-Pérez, O Rojas… - Applied Sciences, 2021 - mdpi.com
In the last three decades, the RC4 has been the most cited stream cipher, due to a large
amount of research carried out on its operation. In this sense, dissimilar works have been …

Securing cloud data using secret key 4 optimization algorithm (SK4OA) with a non-linearity run time trend

T Frimpong, JB Hayfron Acquah, YM Missah… - Plos one, 2024 - journals.plos.org
Cloud computing alludes to the on-demand availability of personal computer framework
resources, primarily information storage and processing power, without the customer's direct …

An Advanced Rivest Cipher 4 Algorithm to Transfer Fast and Secure Data Using Li-Fi Technology

MM Msallam, R Samet - 2023 IEEE 13th International …, 2023 - ieeexplore.ieee.org
The Light-Fidelity (Li-Fi) is a wireless communication technology that is light-based and can
complete wireless fidelity (Wi-Fi) technologies for many applications. Li-Fi technology which …

[HTML][HTML] SIMECK-T: An Ultra-Lightweight Encryption Scheme for Resource-Constrained Devices

AA Anton, P Csereoka, EA Capota, RD Cioargă - Applied Sciences, 2025 - mdpi.com
The Internet of Things produces vast amounts of data that require specialized algorithms in
order to secure them. Lightweight cryptography requires ciphers designed to work on …

[HTML][HTML] New Weak Keys with Parity Patterns in the RC4 Stream Cipher

EJ Madarro-Capó, CM Legón-Pérez, G Sosa-Gómez… - Cryptography, 2024 - mdpi.com
The RC4 cryptographic algorithm is the most extensively studied stream cipher of the past
two decades. This extensive research has resulted in numerous publications, many of which …

[PDF][PDF] The security of RC4 algorithm using keys generation depending on users retina

HM Salih, RS Al Mahdawi - Indonesian Journal of …, 2021 - pdfs.semanticscholar.org
Digital technologies grow more rapidly; information security threats are becoming
increasingly dangerous. Advanced and various cyber-attacks and security threats, like …

[引用][C] Análisis computacional del algoritmo RC4 y sus variantes

YG Machado - 2021 - Universidad de La Habana