An effective modification of play fair cipher with performance analysis using 6X6 matrix

MM Maha, M Masuduzzaman, A Bhowmik - Proceedings of the …, 2020 - dl.acm.org
Researchers have shown great interest in expanding and modifying the Playfair Cipher
algorithm to overcome its pre-existing demerits. An explosion of research in cryptography for …

APIs in internet of things communications security threats and solutions

S Altayran, T Homeed, W Elmedany - 2022 - IET
As technology evolves, more and more devices are linked; most of these devices are called
the Internet of Things (IoT). IoT extends in different domains, from public health care and …

VPN Queue Performance Analysis Using Matrix Analytic Methods

IO Yusuf - 2024 - search.proquest.com
The post-COVID era has seen a drastic increase in the remote work policy, giving rise to the
fast adoption of Virtual Private Networks, VPN technology. While this is not a new …

An awareness model for the use of information technology security policies in the petroleum retail sector in South Africa

Z Nkandi - 2023 - etd.cput.ac.za
The petroleum (oil and gas) retail industry in South Africa depends on the use of Information
Technology (IT) in its operations, including distribution. Consequently, digital transformation …

[PDF][PDF] Blockchain Enabled UAV Assisted Unregistered Vehicle Identification System using Mobile Edge Computing

M Masuduzzaman, A Islam… - 한국통신학회 …, 2020 - journal-home.s3.ap-northeast-2 …
Unregistered vehicle identification is one challenging issue to solve in the perspective of a
smart city as it is responsible for different consequences like a traffic accident, vehicle …