Botnets unveiled: A comprehensive survey on evolving threats and defense strategies

M Asadi, MAJ Jamali, A Heidari… - Transactions on …, 2024‏ - Wiley Online Library
Botnets have emerged as a significant internet security threat, comprising networks of
compromised computers under the control of command and control (C&C) servers. These …

Comprehensive review and analysis of cryptography techniques in cloud computing

K Sasikumar, S Nagarajan - IEEE Access, 2024‏ - ieeexplore.ieee.org
Cloud computing is a fast-growing industry that offers various online services, including
software, computing resources, and databases. Its payment model is usage-based, whereas …

IoT-enabled secure and scalable cloud architecture for multi-user systems: A hybrid post-quantum cryptographic and blockchain-based approach toward a trustworthy …

RR Irshad, S Hussain, I Hussain, JA Nasir, A Zeb… - IEEE …, 2023‏ - ieeexplore.ieee.org
Cloud computing has revolutionized organizational operations by providing convenient, on-
demand access to resources. The emergence of the Internet of Things (IoT) has introduced a …

[HTML][HTML] Efficient time-oriented latency-based secure data encryption for cloud storage

S Ahmad, S Mehfuz - Cyber Security and Applications, 2024‏ - Elsevier
To ensure data security in the cloud, there exist several techniques proposed by various
researchers. The most common method is the usage of data encryption techniques like …

Effective Identification and Authentication of Healthcare IoT Using Fog Computing with Hybrid Cryptographic Algorithm

PB Corthis, GP Ramesh, M García-Torres, R Ruíz - Symmetry, 2024‏ - mdpi.com
Currently, Internet of Things (IoT)-based cloud systems face several problems such as
privacy leakage, failure in centralized operation, managing IoT devices, and malicious …

[HTML][HTML] Defensive strategies against PCC attacks based on ideal (t, n)-secret sharing scheme

S Ali, J Wang, VCM Leung - Journal of King Saud University-Computer and …, 2023‏ - Elsevier
We present a method to increase the dependability of cloud-based applications. Traditional
Secret Sharing Schemes (SSSs) typically fail to counter the challenges brought on by …

Advancing quantum steganography: a secure IoT communication with reversible decoding and customized encryption technique for smart cities

S Biswas, RS Goswami, KHK Reddy - Cluster Computing, 2024‏ - Springer
Smart cities, fueled by the Internet of Things (IoT), promise urban efficiency and
convenience. However, it has also exposed vulnerabilities in the security and privacy of …

Exploring the fusion of lattice‐based quantum key distribution for secure Internet of Things communications

S Biswas, RS Goswami… - IET Quantum …, 2024‏ - Wiley Online Library
The integration of lattice‐based cryptography principles with Quantum Key Distribution
(QKD) protocols is explored to enhance security in the context of Internet of Things (IoT) …

Strengthening KMS security with advanced cryptography, machine learning, deep learning, and IoT technologies

JO Ogala, S Ahmad, I Shakeel, J Ahmad… - SN Computer …, 2023‏ - Springer
This paper presents an innovative approach to strengthening Key Management Systems
(KMS) against the escalating landscape of cyber threats by integrating advanced …

Integrating fully homomorphic encryption to enhance the security of blockchain applications

X Wu, J Wang, T Zhang - Future Generation Computer Systems, 2024‏ - Elsevier
Blockchain has been widely used for secure transactions among untrusted parties, but the
current design of blockchain does not provide sufficient privacy and security for the data on …