AK Sharma, SK Mittal - 2019 Third International Conference on …, 2019 - ieeexplore.ieee.org
Hash Functions have a distinct paramount significance in the sub domain of Networking like Network Security, Computer Security and Internet Security as compare to Symmetric and …
In this work, we propose a novel approach to enhancing the security of passwords before storing them in databases. Our method utilizes Braille transformation to encrypt the …
Cryptography has become one of the vital disciplines for information technology such as IoT (Internet Of Things), IIoT (Industrial Internet Of Things), I4. 0 (Industry 4.0), and automotive …
S Ghosh, M Zaman, G Sakauye, S Sampalli - Applied Sciences, 2021 - mdpi.com
The rapid emergence of quantum computing threatens current Supervisory Control and Data Acquisition (SCADA) security standards, mainly, American Gas Association (AGA)-12 …
In a world witnessing paradigm shift towards decentralized applications, blockchain has become a promising solution where it provides consensus and trust among participating …
H Rohil - Computational Intelligence in Analytics and Information … - taylorfrancis.com
One of the tremendous services that the cloud environment offers is data sharing and storage. However, one of the prime concerns encountered in the cloud is security. It also …
The project intends to portray an approach to design a cryptographic secured way to transmit messages on the well-known CAN bus communication protocol in modern cars …