Search Result "cryptography"


Cryptography using the Internet of Things

Ebook: Intelligent Technologies for Automated Electronic Systems

Volume: 1 Year: 2024
Author(s):
Doi: 10.2174/9789815179514124010016
Research Article

Comparative Study of Cryptography for Cloud Computing for Data Security

Journal: Recent Advances in Computer Science and Communications
Volume: 14 Issue: 5 Year: 2021 Page: 1516-1521
Author(s): Priya Mathur,Amit Kumar Gupta,Prateek Vashishtha

Research Article

Network Security and Cryptography: Threats, Obstacles and Solutions - A Bibliometric Analysis

Journal: Recent Advances in Computer Science and Communications
Volume: 17 Issue: 0 Year: 2024 Page: 1-19
Author(s):

Research Article

Hybrid Cryptography Algorithm for Securing Wireless Sensor Networks from Node Clone Attack

Journal: Recent Advances in Electrical & Electronic Engineering
Volume: 13 Issue: 2 Year: 2020 Page: 251-259
Author(s): Vandana Mohindru,Yashwant Singh,Ravindara Bhatt

IOT-Based Smart Healthcare System with Hybrid Key Generation and DNA Cryptography

Ebook: Blockchain and IoT based Smart Healthcare Systems

Volume: 1 Year: 2024
Author(s):
Doi: 10.2174/9789815196290124010011
Research Article

Protecting Cloud Computing Environments from Malicious Attacks Using multi-factor Authentication and Modified DNA Cryptography

Journal: Recent Patents on Engineering
Volume: 18 Issue: 0 Year: 2024 Page: 1-21
Author(s):

Research Article

Wavelet Denoising in a Highly Secure Covert Communication

Journal: International Journal of Sensors, Wireless Communications and Control
Volume: 11 Issue: 4 Year: 2021 Page: 395-406
Author(s): Pooja Sharma,Sharvan Kumar Pahuja,Karan Veer

Research Article

IoT with Cloud-Based End to End Secured Disease Diagnosis Model using Light Weight Cryptography and Gradient Boosting Tree

Journal: Recent Advances in Computer Science and Communications
Volume: 14 Issue: 8 Year: 2021 Page: 2631-2638
Author(s): K. Shankar

Review of Solutions for Securing End-User Data Over Cloud Applications

Ebook: New Age Cyber Threat Mitigation for Cloud Computing Networks

Volume: 1 Year: 2023
Author(s):
Doi: 10.2174/9789815136111123010008
Research Article

New Key-Dependent S-Box Generation Algorithm on AES

Journal: Micro and Nanosystems
Volume: 14 Issue: 3 Year: 2022 Page: 263-271
Author(s): Proteeti Das,Najmul Hoque Munshi,Subhasis Maitra

Previous   Next

Go To   Results 1 - 1 of 172

Filter Result

Volume Year
Content Type
Ads
© 2024 Bentham Science Publishers | Privacy Policy