[PDF][PDF] Reducing the Encrypted Data Size: Healthcare with IoT-Cloud Computing Applications.

R Kebache, A Laouid, A Bounceur, M Kara… - … Systems Science & …, 2024 - researchgate.net
Internet cloud services come at a price, especially when they provide top-tier security
measures. The cost incurred by cloud utilization is directly proportional to the storage …

A Survey on Cybersecurity in IoT.

E Dritsas, M Trigka - Future Internet, 2025 - search.ebscohost.com
The proliferation of the Internet of Things (IoT) has transformed the digital landscape,
enabling a vast array of interconnected devices to communicate and share data seamlessly …

[HTML][HTML] A blind signature scheme for IoV based on 2D-SCML image encryption and lattice cipher

M Gao, J Li, X Di, X Li, M Zhang - Expert Systems with Applications, 2024 - Elsevier
Abstract Today's Internet of Vehicles (IoV) faces many security risks in the data transmission
process, and image data is more vulnerable to security threats in the transmission process …

Forensics Investigation on Social Media Apps and Web Apps Messaging in Android Smartphone

RFA Hweidi, M Jazzar, A Eleyan… - … Conference on Smart …, 2023 - ieeexplore.ieee.org
The widespread usage of smartphones in many domains such as education, finance,
organizations, and gaming makes hackers covet them and raises the challenge of facing …

Cascade cryptographic key-distribution protocol over a public network based on snapshot compressive ghost imaging

WK Yu, SF Wang, KQ Shang - Physical Review Applied, 2024 - APS
Computational ghost imaging is widely used in classical cryptographic key distribution
(CKD) because its measurement and reconstruction are equivalent to the encoding and …

A survey analysis of quantum computing adoption and the paradigm of privacy engineering

N Mousa, F Shirazi - Security and Privacy, 2024 - Wiley Online Library
This study investigates the adoption of quantum computing (QC) technology using the
diffusion of innovation (DOI) theory and provides an extensive literature review. We …

Develo** Web-Based Application for QR Code Digital Signatures using OpenSSL

FB Muzakkir, HA Darwito… - 2024 International …, 2024 - ieeexplore.ieee.org
Despite advancements in technology, many work-related activities still require signature
verification. Digital signature technology offers a suitable solution that can be implemented …

[HTML][HTML] The digital pheromone: Building digital identity of smartphone users based on time-varying multivariates

AA Bakar, ARM Shariff, CJ Huei, SI Fadilah - ICT Express, 2024 - Elsevier
The increasing reliance on smartphones necessitates secure, accurate user identification
methods. This study introduces “digital pheromones”, a novel digital identity creation method …

An authenticated method for a secure changing password

M Kara, K Karampidis, L Kenioua… - … & Education (EEITE), 2024 - ieeexplore.ieee.org
Despite their age, passwords are still widely used more than ever. In many cases, it is the
solution that best fits the usage scenario. Researchers are proposing innovative designs …

An Adaptive Image Watermarking based on Bellman-Ford Algorithm

B Ferik, L Laimeche, A Meraoumia, A Laouid… - Proceedings of the 7th …, 2023 - dl.acm.org
Ensuring the integrity and authenticity of images is a paramount task in the digital
multimedia context. The emergence of digital technologies necessitates the development of …