Best Fit DNA-Based Cryptographic Keys: The Genetic Algorithm Approach

P Mukherjee, H Garg, C Pradhan, S Ghosh… - Sensors, 2022 - mdpi.com
DNA (Deoxyribonucleic Acid) Cryptography has revolutionized information security by
combining rigorous biological and mathematical concepts to encode original information in …

A lightweight authentication scheme for 5G mobile communications: a dynamic key approach

R Pothumarti, K Jain, P Krishnan - Journal of Ambient Intelligence and …, 2021 - Springer
The security of modern IoT Industry 4.0, 5G, 6G, Mobile ad hoc (MANET), narrowband
internet of things (NB-IoT) and wireless sensory (WSN) networks and the autonomous …

A survey on secure communication techniques for 5G wireless heterogeneous networks

A Kakkar - Information Fusion, 2020 - Elsevier
With the increasing number of emerging robust networks, the challenges to design new
security protocols and techniques are never ending. With the enlargement of 5G paradigm …

E-ART: A new encryption algorithm based on the reflection of binary search tree

B Alabdullah, N Beloff, M White - Cryptography, 2021 - mdpi.com
Data security has become crucial to most enterprise and government applications due to the
increasing amount of data generated, collected, and analyzed. Many algorithms have been …

Protein Motifs to Hide GA‐Based Encrypted Data

NA Mawla, HK Khafaji - Scientific Programming, 2022 - Wiley Online Library
The arms of the Internet octopus have reached the ends of the planet. As it has become
indispensable in our daily lives, huge amounts of information are transmitted through this …

[PDF][PDF] Adaptive key generation algorithm based on software engineering methodology

MS Croock, ZA Hassan, SD Khudhur - International Journal of …, 2021 - academia.edu
Recently, the generation of security keys has been considered for guaranteeing the
strongest of them in terms of randomness. In addition, the software engineering …

Encryption with automatic key generation and compression

GC Madhu, V Perumal - 2022 Third International Conference …, 2022 - ieeexplore.ieee.org
Many applications rely on the transmission of digital images which contains confidential
information. It is necessary to secure the confidential images from the eve's droppers. Along …

Innovation performance of listed companies based on machine computing and data envelopment analysis

X Song - Journal of Ambient Intelligence and Humanized …, 2021 - Springer
The introduction and creation of new technological means can change and promote the
process and results of economic development, thus promoting the steady progress of …

[PDF][PDF] E-ART: A New Encryption Algorithm Based on the Reflection of Binary Search Tree. Cryptography 2021, 5, 4

B Alabdullah, N Beloff, M White - 2021 - pdfs.semanticscholar.org
Data security has become crucial to most enterprise and government applications due to the
increasing amount of data generated, collected, and analyzed. Many algorithms have been …

Novel reversible text data de-identification techniques based on native data structures

B Alabdullah - 2022 - sussex.figshare.com
Technological development in today's digital world has resulted in the collection and storage
of large amounts of personal data. These data enable both direct services and non-direct …