MA Iliyasu, OA Abisoye, SA Bashir… - 2020 IEEE 2nd …, 2021 - ieeexplore.ieee.org
Cryptography is described as the encryption analysis of data or secret data writing using logical and mathematical data protection principles. It is an information technology for …
D Shivaramakrishna, M Nagaratna - Alexandria Engineering Journal, 2023 - Elsevier
The rapid proliferation of cloud computing has necessitated advanced security mechanisms to safeguard sensitive data stored in remote servers. However, this paradigm shift has raised …
MS Abbas, SS Mahdi… - … international conference on …, 2020 - ieeexplore.ieee.org
One of the significant advancements in information technology is Cloud computing, but the security issue of data storage is a big problem in the cloud environment. That is why a …
Boolean operations utilizing DNA as a platform for biocomputing have become a promising tool for next-generation bio-molecular computers. In the whole process of any binary data …
GS Mahmood, DJ Huang, BA Jaleel - Int. J. Netw. Secur., 2019 - researchgate.net
Cloud computing allows users to store their data remotely. Users can enjoy cloud applications on-demand without the burden of maintaining personal hardware and …
S Aqeel, SU Khan, AS Khan, M Alharbi, S Shah… - Scientific Reports, 2024 - nature.com
With the urge to secure and protect digital assets, there is a need to emphasize the immediacy of taking measures to ensure robust security due to the enhancement of cyber …
Today's digital world necessitates the adoption of encryption techniques to ensure secure peer-to-peer communication. The sole purpose of this paper is to conglomerate the …
A Kumar - 2021 Fifth International Conference on I-SMAC (IoT …, 2021 - ieeexplore.ieee.org
Cloud computing has changed how humans use their technological expertise. It indicates a transition in the use of computers as utilitarian instruments with radical applications in …
P Vinotha, D Jose - … Technologies and Virtual Mobile Networks: ICICV …, 2020 - Springer
Image security is emerging as a major problem with the exponential growth of data stored and transformed through the network around the world. Many cryptographic techniques are …