[HTML][HTML] Federated learning for secure IoMT-applications in smart healthcare systems: A comprehensive review
Recent developments in the Internet of Things (IoT) and various communication
technologies have reshaped numerous application areas. Nowadays, IoT is assimilated into …
technologies have reshaped numerous application areas. Nowadays, IoT is assimilated into …
Systematic and critical review of rsa based public key cryptographic schemes: Past and present status
The interconnected digital world is generating enormous data that must be secured from
unauthorized access. Advancement in technologies and new innovative methods applied by …
unauthorized access. Advancement in technologies and new innovative methods applied by …
An enhanced and secured RSA key generation scheme (ESRKGS)
M Thangavel, P Varalakshmi, M Murrali… - Journal of information …, 2015 - Elsevier
Public-key cryptography can be claimed as the greatest and an excellent revolution in the
field of cryptography. A public-key cryptosystem is used for both confidentiality and …
field of cryptography. A public-key cryptosystem is used for both confidentiality and …
[HTML][HTML] Face recognition system with hybrid template protection scheme for Cyber–Physical-Social Services
This paper presents a secure face recognition system with advanced template protection
schemes for Cyber–Physical–Social Services (CPSS). The implementation of the proposed …
schemes for Cyber–Physical–Social Services (CPSS). The implementation of the proposed …
A secure IoT based healthcare framework using modified RSA algorithm using an artificial hummingbird based CNN
Recently, a wide variety of real‐world problems are solved via cloud computing, deep
learning, machine learning, artificial intelligence, and the Internet of Things (IoT). These …
learning, machine learning, artificial intelligence, and the Internet of Things (IoT). These …
An effective and enhanced RSA based public key encryption scheme (XRSA)
Cryptography is the mechanism of providing significant security services such as
confidentiality, authentication, and integrity. These services are essentially more important in …
confidentiality, authentication, and integrity. These services are essentially more important in …
[PDF][PDF] Modified RSA algorithm using two public key and Chinese remainder theorem
RS Abdeldaym, HM Abd Elkader… - IJ of Electronics and …, 2019 - ijeie.jalaxy.com.tw
Network security is an activity which is designed to protect the integrity and usability of the
data and network. In network security [14], the branch of cryptography is which one can save …
data and network. In network security [14], the branch of cryptography is which one can save …
Modified RSA cryptosystem based on offline storage and prime number
The most common public key algorithm is RSA cryptosystem used for encryption and
decryption. It is the first public key algorithm which provides security to transfer and saving of …
decryption. It is the first public key algorithm which provides security to transfer and saving of …
[PDF][PDF] Cloud security algorithms
EA Pansotra, ESP Singh - International journal of security and its …, 2015 - researchgate.net
Cloud computing appear to be a very popular and interesting computing technology. Every
third person is using cloud computing directly or indirectly for example e-mail, most …
third person is using cloud computing directly or indirectly for example e-mail, most …
Post-quantum cryptography-driven security framework for cloud computing
Data security in the cloud has been a major issue since the inception and adoption of cloud
computing. Various frameworks have been proposed, and yet data breach prevails. With …
computing. Various frameworks have been proposed, and yet data breach prevails. With …