Quantum cryptography research over the past two decades–Review, research implications, and future directions
S Singh, V Bharathi - AIP Conference Proceedings, 2023 - pubs.aip.org
The study proposes a unique blend of bibliometric analysis and systematic literature review
con-ducted on the Scopus database to extensively review and bring out the research …
con-ducted on the Scopus database to extensively review and bring out the research …
A two-layer image-steganography system for covert communication over enterprise network
Computers find application in virtually all aspect of human existence, especially in today's
modern world. Although this comes with a lot of benefits, it also comes with a number of …
modern world. Although this comes with a lot of benefits, it also comes with a number of …
Cyber Security in the Age of COVID-19
As a containment strategy for the dreaded Corona Virus Disease 19 (COVID 19) which is
spreading rapidly and causing severe damage to life and economy of nations, places of …
spreading rapidly and causing severe damage to life and economy of nations, places of …
A Secure Electronic Voting System Using Multifactor Authentication and Blockchain Technologies
This chapter presents a distributed e-voting system that solves the problems of vote-rigging,
voter impersonation, and vote falsification, all of which are prevalent in traditional paper …
voter impersonation, and vote falsification, all of which are prevalent in traditional paper …
Multifactor IoT Authentication System for Smart Homes Using Visual Cryptography, Digital Memory, and Blockchain Technologies
In this era of smartness, the existing access control of things and objects in homes utilizes
personal identification number (PIN)-or password-based authentication scheme, which …
personal identification number (PIN)-or password-based authentication scheme, which …
[PDF][PDF] Quantum attack-resistant security system for cloud computing using lattice cryptography
The safety and security of various cryptosystems are related to the hardness of the integer
factorization problem and discrete logarithm problem, most cryptosystems will be rendered …
factorization problem and discrete logarithm problem, most cryptosystems will be rendered …
A new post-quantum voting protocol based on physical laws
Z Sun, W Gao, H Dong, H **e, L Yang - Quantum Information Processing, 2022 - Springer
The post-quantum security of electronic voting protocols such as lattice-based ones are
based on the assumption of certain difficult computational problems, which cannot be solved …
based on the assumption of certain difficult computational problems, which cannot be solved …
[HTML][HTML] Perspective Chapter: Quantum Steganography–Encoding Secrets in the Quantum Domain
The chapter provides a comprehensive overview of the evolving field of quantum
steganography, highlighting its potential impact on information security in the age of …
steganography, highlighting its potential impact on information security in the age of …
Development of an audio steganography system using discrete cosine transform and spread spectrum techniques
In today's electronic society, security of information is an issue of major concern especially in
the communication domain. Indeed, there is a very serious need for schemes that guarantee …
the communication domain. Indeed, there is a very serious need for schemes that guarantee …
Proba: privacy-preserving, robust and accessible blockchain-powered helios
S Kocaman - 2024 - open.metu.edu.tr
Helios is the first web-based and open-audit voting system. The open-audit feature allows
anyone to track the voting process, thus providing easy verifiability in all stages of the …
anyone to track the voting process, thus providing easy verifiability in all stages of the …