Weighted ternary tree approach for secure group communication among mobile applications

P Parthasarathi, S Shankar - Wireless Personal Communications, 2021 - Springer
Recent trends and clustered technology in the IT industries create usage of various hand-
held computing devices like mobile phones, digitizer, modem, tablets etc. The Mobile …

Secure secret key and private key generation in source-type model with a trusted helper

S Gong, X Tao, N Li, H Wang, Z Han - IEEE Access, 2020 - ieeexplore.ieee.org
Encrypting information with pre-agreed key is an effective method to ensure information
security. With the increasing requirement for key rate, this paper investigates the problem of …

A survey on dynamic key management system in secure group communication

P Parthasarathi, S Shankar… - 2020 6th International …, 2020 - ieeexplore.ieee.org
Distributed Computing and Mobile Computing are created some measurable impact on
growth in Information Technology with respect to all the streams of engineering. The major …

[PDF][PDF] Key generation method based on Genitor Genetic Algorithm model.

A Pryimak, Y Yaremchuk, N Kunanets - CMiGIN, 2022 - ceur-ws.org
The study examines the current genetic algorithm-based key generation methods. Their
models of work were studied, and the advantages and disadvantages are described, in …

FPGA Implementation of Secure Block Creation Algorithm for Blockchain Technology

A Kulkarni, P Thakur, R Rajashree - SPAST Abstracts, 2021 - spast.org
Blockchain technology is very essential for secure storage and authentication of information
data. In this modern day of digitization, it is necessary to protect data from misuse, falling into …