Authentication protocols are often used in smart grids to deliver the necessary level of security. A huge number of clients in such a system, however, provides the attacker with the …
I Shakeel, S Mehfuz, S Ahmad - 2022 11th International …, 2022 - ieeexplore.ieee.org
Innovation permeates deep into every part of our modern life and, in doing so, easily enables attackers to readily penetrate and attack a targeted enterprise at the least …
D Jonas, I Sembiring, A Setiawan… - … on Cyber and IT …, 2023 - ieeexplore.ieee.org
The use of healthcare-based IOT becomes something that is unavoidable, especially when a pandemic occurs, where a screening process is needed for a person's condition. This …
Virtual computing resources are provided via a cloud system that is both clever and intelligent. Based on the user's request, computing resources are made available. A hybrid …
SW Zahra, M Nadeem, A Arshad, S Riaz, W Ahmed… - Symmetry, 2024 - mdpi.com
Researchers have created cryptography algorithms that encrypt data using a public or private key to secure it from intruders. It is insufficient to protect the data by using such a key …
Various organizations store data online rather than on physical servers. As the number of user's data stored in cloud servers increases, the attack rate to access data from cloud …
Data centers and business networks are rapidly using SDN (Software Defined Networking), an emerging technology. It isolates the control plane from the underlying data or forwarding …
There are many cloud data security techniques and algorithms available that can be used to detect attacks on cloud data, but these techniques and algorithms cannot be used to protect …
Currently, data security mainly relies on password (PW) or system channel key (SKCH) to encrypt data before they are sent, no matter whether in broadband networks, the 5th …