[PDF][PDF] Reducing the Encrypted Data Size: Healthcare with IoT-Cloud Computing Applications.
Internet cloud services come at a price, especially when they provide top-tier security
measures. The cost incurred by cloud utilization is directly proportional to the storage …
measures. The cost incurred by cloud utilization is directly proportional to the storage …
A Survey on Cybersecurity in IoT.
The proliferation of the Internet of Things (IoT) has transformed the digital landscape,
enabling a vast array of interconnected devices to communicate and share data seamlessly …
enabling a vast array of interconnected devices to communicate and share data seamlessly …
[HTML][HTML] A blind signature scheme for IoV based on 2D-SCML image encryption and lattice cipher
M Gao, J Li, X Di, X Li, M Zhang - Expert Systems with Applications, 2024 - Elsevier
Abstract Today's Internet of Vehicles (IoV) faces many security risks in the data transmission
process, and image data is more vulnerable to security threats in the transmission process …
process, and image data is more vulnerable to security threats in the transmission process …
Forensics Investigation on Social Media Apps and Web Apps Messaging in Android Smartphone
The widespread usage of smartphones in many domains such as education, finance,
organizations, and gaming makes hackers covet them and raises the challenge of facing …
organizations, and gaming makes hackers covet them and raises the challenge of facing …
Cascade cryptographic key-distribution protocol over a public network based on snapshot compressive ghost imaging
WK Yu, SF Wang, KQ Shang - Physical Review Applied, 2024 - APS
Computational ghost imaging is widely used in classical cryptographic key distribution
(CKD) because its measurement and reconstruction are equivalent to the encoding and …
(CKD) because its measurement and reconstruction are equivalent to the encoding and …
A survey analysis of quantum computing adoption and the paradigm of privacy engineering
This study investigates the adoption of quantum computing (QC) technology using the
diffusion of innovation (DOI) theory and provides an extensive literature review. We …
diffusion of innovation (DOI) theory and provides an extensive literature review. We …
Develo** Web-Based Application for QR Code Digital Signatures using OpenSSL
FB Muzakkir, HA Darwito… - 2024 International …, 2024 - ieeexplore.ieee.org
Despite advancements in technology, many work-related activities still require signature
verification. Digital signature technology offers a suitable solution that can be implemented …
verification. Digital signature technology offers a suitable solution that can be implemented …
[HTML][HTML] The digital pheromone: Building digital identity of smartphone users based on time-varying multivariates
The increasing reliance on smartphones necessitates secure, accurate user identification
methods. This study introduces “digital pheromones”, a novel digital identity creation method …
methods. This study introduces “digital pheromones”, a novel digital identity creation method …
An authenticated method for a secure changing password
Despite their age, passwords are still widely used more than ever. In many cases, it is the
solution that best fits the usage scenario. Researchers are proposing innovative designs …
solution that best fits the usage scenario. Researchers are proposing innovative designs …
An Adaptive Image Watermarking based on Bellman-Ford Algorithm
Ensuring the integrity and authenticity of images is a paramount task in the digital
multimedia context. The emergence of digital technologies necessitates the development of …
multimedia context. The emergence of digital technologies necessitates the development of …