Comprehensive study of symmetric key and asymmetric key encryption algorithms

MB Yassein, S Aljawarneh… - … on engineering and …, 2017 - ieeexplore.ieee.org
Cloud computing emerged in the last years to handle systems with large-scale services
sharing between vast numbers of users. It provides enormous storage for data and …

A dynamic light-weight symmetric encryption algorithm for secure data transmission via BLE beacons

S Banani, S Thiemjarus, K Wongthavarawat… - Journal of Sensor and …, 2021 - mdpi.com
Pervasive sensing with Body Sensor Networks (BSNs) is a promising technology for
continuous health monitoring. Since the sensor nodes are resource-limited, on-node …

Machine learning cryptography methods for IoT in healthcare

T Chinbat, S Madanian, D Airehrour… - BMC Medical Informatics …, 2024 - Springer
Background The increased application of Internet of Things (IoT) in healthcare, has fueled
concerns regarding the security and privacy of patient data. Lightweight Cryptography …

[PDF][PDF] Study & analysis of cryptography algorithms: RSA, AES, DES, T-DES, blowfish

P Singh, S Kumar - Int. J. Eng. Technol, 2017 - researchgate.net
Cryptography is about protecting the data from third parties or from public to read
confidential data. Cryptography mainly focuses on encrypting the data or we can say …

Appropriate Security Algorithms to Mitigate the Risks in a Database of the National Customs Service of Ecuador

SMT Toapanta, KLP Astudillo… - Proceedings of the 2020 …, 2020 - dl.acm.org
Currently, the use of technological resources, within public and private institutions, has
become essential, due to the need to modernize processes, high commercial needs and …

Securing Image Metadata using Advanced Encryption Standard

R Bhangale - 2020 - norma.ncirl.ie
The fast-growing internet brought an increase in the number of online content sharing
platforms, as well as the growing size of the user base. This growth has led to a plethora of …

[PDF][PDF] Koblitz Curve-A Mapping Technique to Encipher/Decipher the Text message using Elliptic Curve Cryptography

D Bhatia - Journal of Scientific Research, 2022 - bhu.ac.in
Elliptic Curve Cryptography (ECC) is studied to be very powerful and secured asymmetric
technique which uses small key sizes and efficiently uses power and bandwidth. Wired and …

[PDF][PDF] A comparison of lightweight Ciphers Meeting NIST lightweight cryptography requirements to the advanced encryption standard

J Figueroa-Hernandez Jr - 2019 - scholarworks.calstate.edu
As the Internet has become a major part of a person's daily life, the type of devices
connected to the Internet has expanded. Network access, including the Internet, is no longer …

An Entire Dynamic Malware Examination with Near Investigation of Conduct Examination Sandboxes

T Choudhury, S Jain, SKN Aradhya… - … Conference on Green …, 2018 - ieeexplore.ieee.org
Malicious programming or malware, has developed quickly in addition, indicated
tremendous data security difficulties to a PC framework. Gigantic amounts of AntiVirus things …

[PDF][PDF] Enhancing Data Security through Implementation of a Hybrid Cryptosystem with Emphasis on Levels of Entropy

L Kearns - 2021 - norma.ncirl.ie
As the technology world we live in today continues to rapidly develop and we see more and
more people sharing data across the internet, new and advanced ways of securing this data …