[HTML][HTML] Federated learning for secure IoMT-applications in smart healthcare systems: A comprehensive review

S Rani, A Kataria, S Kumar, P Tiwari - Knowledge-based systems, 2023 - Elsevier
Recent developments in the Internet of Things (IoT) and various communication
technologies have reshaped numerous application areas. Nowadays, IoT is assimilated into …

Systematic and critical review of rsa based public key cryptographic schemes: Past and present status

R Imam, QM Areeb, A Alturki, F Anwer - IEEE access, 2021 - ieeexplore.ieee.org
The interconnected digital world is generating enormous data that must be secured from
unauthorized access. Advancement in technologies and new innovative methods applied by …

An enhanced and secured RSA key generation scheme (ESRKGS)

M Thangavel, P Varalakshmi, M Murrali… - Journal of information …, 2015 - Elsevier
Public-key cryptography can be claimed as the greatest and an excellent revolution in the
field of cryptography. A public-key cryptosystem is used for both confidentiality and …

[HTML][HTML] Face recognition system with hybrid template protection scheme for Cyber–Physical-Social Services

A Sardar, S Umer, RK Rout, C Pero - Pattern Recognition Letters, 2023 - Elsevier
This paper presents a secure face recognition system with advanced template protection
schemes for Cyber–Physical–Social Services (CPSS). The implementation of the proposed …

A secure IoT based healthcare framework using modified RSA algorithm using an artificial hummingbird based CNN

TP Jacob, A Pravin, RR Kumar - Transactions on Emerging …, 2022 - Wiley Online Library
Recently, a wide variety of real‐world problems are solved via cloud computing, deep
learning, machine learning, artificial intelligence, and the Internet of Things (IoT). These …

An effective and enhanced RSA based public key encryption scheme (XRSA)

R Imam, F Anwer, M Nadeem - International Journal of Information …, 2022 - Springer
Cryptography is the mechanism of providing significant security services such as
confidentiality, authentication, and integrity. These services are essentially more important in …

[PDF][PDF] Modified RSA algorithm using two public key and Chinese remainder theorem

RS Abdeldaym, HM Abd Elkader… - IJ of Electronics and …, 2019 - ijeie.jalaxy.com.tw
Network security is an activity which is designed to protect the integrity and usability of the
data and network. In network security [14], the branch of cryptography is which one can save …

Modified RSA cryptosystem based on offline storage and prime number

R Patidar, R Bhartiya - 2013 IEEE International Conference on …, 2013 - ieeexplore.ieee.org
The most common public key algorithm is RSA cryptosystem used for encryption and
decryption. It is the first public key algorithm which provides security to transfer and saving of …

[PDF][PDF] Cloud security algorithms

EA Pansotra, ESP Singh - International journal of security and its …, 2015 - researchgate.net
Cloud computing appear to be a very popular and interesting computing technology. Every
third person is using cloud computing directly or indirectly for example e-mail, most …

Post-quantum cryptography-driven security framework for cloud computing

HC Ukwuoma, G Arome, A Thompson… - Open Computer …, 2022 - degruyter.com
Data security in the cloud has been a major issue since the inception and adoption of cloud
computing. Various frameworks have been proposed, and yet data breach prevails. With …