Smart grid metering networks: A survey on security, privacy and open research issues

P Kumar, Y Lin, G Bai, A Paverd… - … Surveys & Tutorials, 2019 - ieeexplore.ieee.org
Smart grid (SG) networks are newly upgraded networks of connected objects that greatly
improve reliability, efficiency, and sustainability of the traditional energy infrastructure. In this …

Data masking techniques for NoSQL database security: A systematic review

A Cuzzocrea, H Shahriar - … conference on big data (Big Data), 2017 - ieeexplore.ieee.org
This paper first presents an in-depth study of potential security vulnerabilities in MongoDB
and Cassandra, two popular NoSQL databases. We provide examples of attacks. We then …

Comparative study on the performance of elliptic curve cryptography algorithms with cryptography through RSA algorithm

NJG Saho, EC Ezin - CARI 2020-Colloque Africain sur la Recherche en …, 2020 - hal.science
Encryption method is an effective way to guarantee the confidentiality and in other ways
(digital signature) the authenticity of data. The use of the digital signature derives from the …

Blockchain-based deep CNN for brain tumor prediction using MRI scans

F Mohammad, S Al Ahmadi, J Al Muhtadi - Diagnostics, 2023 - mdpi.com
Brain tumors are nonlinear and present with variations in their size, form, and textural
variation; this might make it difficult to diagnose them and perform surgical excision using …

A secure key dependent dynamic substitution method for symmetric cryptosystems

A Ejaz, IA Shoukat, U Iqbal, A Rauf, A Kanwal - PeerJ Computer Science, 2021 - peerj.com
The biggest challenge for symmetric cryptosystems is to replace their static substitution with
dynamic substitution, because static substitution S-boxes make the symmetric block ciphers …

Smart offloading technique for CP-ABE encryption schemes in constrained devices

M Bany Taha, H Ould-Slimane, C Talhi - SN Applied Sciences, 2020 - Springer
Nowadays, we are attending to the wide proliferation of IoT devices in various computing
environments. Actually, this trend is the natural way to extend the M2M communication …

[PDF][PDF] Hybrid cryptography with a one–time stamp to secure contact tracing for covid–19 infection

AAR El-Douh, SF Lu, AA Elkouny… - International Journal of …, 2022 - sciendo.com
The COVID-19 pandemic changed the lives of millions of citizens worldwide in the manner
they live and work to the so-called new norm in social standards. In addition to the …

[PDF][PDF] A survey of access control and data encryption for database security

EF Khalaf, MM Kadi - Journal of King Abdulaziz University, 2017 - kau.edu.sa
With the vast amount of data generated nowadays, organizing and managing of these data
are very important to allow the users to access, retrieve, and update their data by using …

[PDF][PDF] An improved RSA cryptographic system

N Somani, D Mangal - International Journal of Computer Applications, 2014 - Citeseer
Paper introduced RSA cryptosystem and its security aspects. RSA is a public key algorithm
that applied widely in the field of information security in the Internet-Banking and E …

Text encryption using extended bit circular shift cipher

HNN Muchsin, DE Sari… - … on Informatics and …, 2019 - ieeexplore.ieee.org
Various cryptographic algorithms have been evolved to improve data security. One of
development in cryptographic techniques, the especially symmetric key type is Shift Cipher …