A novel cryptosystem based on DNA cryptography and randomly generated mealy machine

P Pavithran, S Mathew, S Namasudra, P Lorenz - Computers & Security, 2021 - Elsevier
Nowadays, the amount of data produced and stored in computing devices is increasing at
an alarming rate. Tremendous amounts of critical and sensitive data are transmitted …

Time efficient secure DNA based access control model for cloud computing environment

S Namasudra, P Roy, P Vijayakumar… - Future Generation …, 2017 - Elsevier
Abstract The uses of Big Data (BD) are gradually increasing in many new emerging
applications, such as Facebook, eBay, Snapdeal, etc. BD is a term, which is used for …

Enhancing randomness of the ciphertext generated by DNA-based cryptosystem and finite state machine

P Pavithran, S Mathew, S Namasudra, A Singh - Cluster Computing, 2023 - Springer
Nowadays, the research in deoxyribonucleic acid (DNA) cryptography seeks to implement
data transmission techniques to ensure secure data transmission across the world. As data …

Taxonomy of DNA-based security models

S Namasudra - Advances of DNA computing in cryptography, 2018 - taylorfrancis.com
This chapter presents taxonomy of a Deoxyribonucleic Acid (DNA)-based security model,
based on the categories. It discusses many existing DNA-based security models along with …

Introduction to DNA computing

T Kumar, S Namasudra - Advances in Computers, 2023 - Elsevier
Abstract Currently, Deoxyribonucleic Acid (DNA) computing is considered as one of the
advanced fields of Information Technology (IT) industries. DNA computing is a technique …

Secure DNA and Morse code based Profile access control models for Cloud Computing Environment

M Yadav, M Breja - Procedia Computer Science, 2020 - Elsevier
Cloud computing is an emerging field in the Information Technology sector which allows
users to access resources from cloud servers irrespective of its geographical location. It …

Enhancing Security and Randomness of DNA Cryptosystem Generated by Using Mealy Machine

K Gaverchand, R Venkatesan… - Journal of Soft …, 2024 - publisher.uthm.edu.my
In the current scenario, a vast amount of confidential data is stored and transmitted over the
internet. Ensuring data security is crucial due to the multitude of threats and risks posed by …

Enhanced DNA cryptosystem for secure cloud data storage

S Sudersan, B Sowmiya, VS Abhijith… - … on Secure Cyber …, 2021 - ieeexplore.ieee.org
Cloud computing has revolutionized the way how users store, process, and use data. It has
evolved over the years to put forward various sophisticated models that offer enhanced …

Protection of critical information in external data stores using the dissection-separation method

GN Shurkhovetsky - IOP Conference Series: Materials Science …, 2021 - iopscience.iop.org
Today, due to the large spread of cloud technologies, more and more individuals and
businesses use their services. It is common practice in the field of cloud technologies to …

[PDF][PDF] Защита информации во внешних хранилищах данных методом рассечения-разнесения

ГН Шурховецкий - Молодая наука Сибири: электрон. науч. журн, 2020 - mnv.irgups.ru
Сегодня ввиду большого распространения облачных технологий всё больше
физических и юридических лиц пользуются их услугами. Общепринятой практикой в …