[HTML][HTML] An improved random bit-stuffing technique with a modified RSA algorithm for resisting attacks in information security (RBMRSA)

FO Mojisola, S Misra, CF Febisola… - Egyptian Informatics …, 2022 - Elsevier
The recent innovations in network application and the internet have made data and network
security the major role in data communication system development. Cryptography is one of …

Blockchain application analysis based on IoT data flow

J Li, X Zhang, W Shi - Electronics, 2022 - mdpi.com
In the Internet of Things (IoT) system, data leakage can easily occur due to the differing
security of edge devices and the different processing methods of data in the transmission …

Data security in cloud using advanced encryption standard

SM Basha, V Rishik, VJN Krishna… - 2023 International …, 2023 - ieeexplore.ieee.org
This research study gives an overview on cloud security to understand the security concerns
and solutions. The internet has revolutionised how people live and work, and cloud …

The Emerging Challenges of Wearable Biometric Cryptosystems

KA Ajlan, T Alsboui, O Alshaikh, I Inuwa-Dute, S Khan… - Cryptography, 2024 - mdpi.com
Cryptographic key generation and data encryption and decryption using wearable biometric
technologies is an emerging research area with significant potential for authentication and …

Enhancing Security and Confidentiality using Trust Based Encryption (DHPKey) in Cloud Computing

R Kalaiyarasi, TA Mohanaprakash… - 2023 14th …, 2023 - ieeexplore.ieee.org
Cloud computing has gained widespread adoption in enterprises due to its on-demand
service, broad network access, and elasticity. However, security issues make it difficult to …

Multilayered architecture for secure communication and transmission for internet of things

Isha, M Saxena, CK Jha - … for Security Applications: Proceedings of ICSCS …, 2022 - Springer
Abstract The Internet of things (IoT) is a worldwide network of objects equipped with
controllers, sensors, and software that can collect, process, and exchange data, and whose …

Securing Ventilators: Integrating Hardware Security Modules with SoftHSM and Cryptographic Algorithms

JT Amael, JE Istiyanto, Z Hakim, RH Sari… - 2024 IEEE 33rd …, 2024 - ieeexplore.ieee.org
The development of Industry 4.0 technologies like IoT and Big Data has improved
healthcare efficiency but also raised security risks for medical devices such as ventilators …

Secure and efficient data storage with Rivest Shamir Adleman algorithm in cloud environment

E Elumalai, D Muruganandam - Bulletin of Electrical Engineering and …, 2024 - beei.org
Cloud computing rapidly is a prerequisite and releases resources with minimal management
effort. The surfacing of the cloud has significantly distorted the general insight into …

Enhancing Secure Video Transmission and Cloud-Based Storage through Advanced Encryption, Hashing, and Distributed Processing

S Suryawanshi, Y Mhaskar… - 2023 International …, 2023 - ieeexplore.ieee.org
It is critical in today's data-centric world to ensure the privacy and security of video data
preserved in the cloud. This investigation looks at the issues of securing video data in cloud …

A Key Based Hybrid Approach for Privacy and Integrity in Multi-Cloud

MD Abdul-Jabbar - Iraqi Journal of Science, 2023 - ijs.uobaghdad.edu.iq
Before users store data in the cloud, many security issues must be addressed, as they will
have no direct control over the data that has been outsourced to the cloud, particularly …