[PDF][PDF] An Efficient Technique to Prevent Data Misuse with Matrix Cipher Encryption Algorithms.

M Nadeem, A Arshad, S Riaz, SW Zahra… - … , Materials & Continua, 2023 - researchgate.net
Many symmetric and asymmetric encryption algorithms have been developed in cloud
computing to transmit data in a secure form. Cloud cryptography is a data encryption …

Two layer symmetric cryptography algorithm for protecting data from attacks

M Nadeem, A Arshad, S Riaz, S Wajiha Zahra… - 2023 - tudasportal.uni-nke.hu
Authentication protocols are often used in smart grids to deliver the necessary level of
security. A huge number of clients in such a system, however, provides the attacker with the …

Securing Data in Cloud: Major Threats and Recent Strategies

I Shakeel, S Mehfuz, S Ahmad - 2022 11th International …, 2022 - ieeexplore.ieee.org
Innovation permeates deep into every part of our modern life and, in doing so, easily
enables attackers to readily penetrate and attack a targeted enterprise at the least …

Xor encryption based on index value enumeration used in iot based healthcare

D Jonas, I Sembiring, A Setiawan… - … on Cyber and IT …, 2023 - ieeexplore.ieee.org
The use of healthcare-based IOT becomes something that is unavoidable, especially when
a pandemic occurs, where a screening process is needed for a person's condition. This …

Data security in cloud environment using cryptographic mechanism

AA Fairosebanu, ACN Jebaseeli - Bulletin of Electrical Engineering and …, 2023 - beei.org
Virtual computing resources are provided via a cloud system that is both clever and
intelligent. Based on the user's request, computing resources are made available. A hybrid …

[HTML][HTML] Emergence of Novel WEDEx-Kerberotic Cryptographic Framework to Strengthen the Cloud Data Security against Malicious Attacks

SW Zahra, M Nadeem, A Arshad, S Riaz, W Ahmed… - Symmetry, 2024 - mdpi.com
Researchers have created cryptography algorithms that encrypt data using a public or
private key to secure it from intruders. It is insufficient to protect the data by using such a key …

[PDF][PDF] An Innovative Approach Using TKN-Cryptology for Identifying the Replay Assault

SW Zahra, M Nadeem, A Arshad, S Riaz… - … Materials & Continua, 2024 - cdn.techscience.cn
Various organizations store data online rather than on physical servers. As the number of
user's data stored in cloud servers increases, the attack rate to access data from cloud …

[PDF][PDF] A Decrease in the Encryption Latency Utilizing Transport Layer Protocols for Software Defined Networks

M Saddheer, W Ahmad, M Nadeem, SW Zahra… - 2023 - researchgate.net
Data centers and business networks are rapidly using SDN (Software Defined Networking),
an emerging technology. It isolates the control plane from the underlying data or forwarding …

[PDF][PDF] Hill Matrix and Radix-64 Bit Algorithm to Preserve Data Confidentiality.

A Arshad, M Nadeem, S Riaz, SW Zahra… - … , Materials & Continua, 2023 - researchgate.net
There are many cloud data security techniques and algorithms available that can be used to
detect attacks on cloud data, but these techniques and algorithms cannot be used to protect …

[PDF][PDF] A Wrapping Encryption Based on Double Randomness Mechanism.

YL Huang, FY Leu, RK Sheu, JC Liu… - … , Materials & Continua, 2023 - cdn.techscience.cn
Currently, data security mainly relies on password (PW) or system channel key (SKCH) to
encrypt data before they are sent, no matter whether in broadband networks, the 5th …