Implementation of a block cipher algorithm for medical information security on cloud environment: using modified advanced encryption standard approach

AE Adeniyi, KM Abiodun, JB Awotunde… - Multimedia Tools and …, 2023 - Springer
The need of keeping medical information safe and secure stems from the fact that doctors
rely on it to make accurate diagnoses. If this information is altered in any way, no matter how …

Computational complexity of modified blowfish cryptographic algorithm on video data

AE Adeniyi, S Misra, E Daniel, A Bokolo Jr - Algorithms, 2022 - mdpi.com
Background: The technological revolution has allowed users to exchange data and
information in various fields, and this is one of the most prevalent uses of computer …

Early forest fire detection using a protocol for energy-efficient clustering with weighted-based optimization in wireless sensor networks

P Kaur, K Kaur, K Singh, SK Kim - Applied Sciences, 2023 - mdpi.com
Wireless sensor networks (WSNs) have proven to be incredibly useful for forest applications
that rely on sensing technologies for event detection and monitoring. This radical sensing …

A dynamic hybrid cryptosystem using chaos and diffie–hellman protocol: An image encryption application

R Flores-Carapia, VM Silva-García… - Applied Sciences, 2023 - mdpi.com
Images with sensitive content require encryption for storage and transmission. Symmetric
schemes can cipher them, while an asymmetric cryptosystem can distribute the secret key …

A Novel Hardware Architecture for Enhancing the Keccak Hash Function in FPGA Devices

A Sideris, T Sanida, M Dasygenis - Information, 2023 - mdpi.com
Hash functions are an essential mechanism in today's world of information security. It is
common practice to utilize them for storing and verifying passwords, developing pseudo …

Enhancing Organizational Data Security on Employee-Connected Devices Using BYOD Policy

MR AlShalaan, SM Fati - Information, 2023 - mdpi.com
To address a business need, most organizations allow employees to use their own devices
to enhance productivity and job satisfaction. For this purpose, the Bring Your Own Device …

A Review of DNA Cryptography: From a Data Protection Perspective

P Parmar, J Gadhiya, S Vats, DK Verma… - … on Security of …, 2023 - ieeexplore.ieee.org
The rate of development in today's IT industry is unprecedented. Information is being stored
and transformed at a faster and faster rate. Therefore, the importance of protecting sensitive …

A smart contract-driven access control scheme with integrity checking for electronic health records

H Li, D Li, W Liang - Cluster Computing, 2024 - Springer
The application of healthcare systems has led to an explosive growth in personal electronic
health records (EHRs). These EHRs are generated from different healthcare institutions and …

Smart Patient Monitoring and Recommendation (SPMR) Using Cloud Analytics and Deep Learning

A Sundas, S Badotra, GS Shahi, A Verma… - IEEE …, 2024 - ieeexplore.ieee.org
The escalating global prevalence of chronic and lifestyle-related illnesses presents
substantial societal and economic challenges. This work delves into an extensive review of …

Adaptive Spatial Scheduling for Event Traffic in LoRaWAN Networks

V Asteriou, K Kantelis, GA Beletsioti, A Valkanis… - Sensors, 2024 - mdpi.com
Low-Power Wide-Area Networks constitute a leading, emerging Internet-of-Things
technology, with important applications in environmental and industrial monitoring and …