Techniques for predicting dark web events focused on the delivery of illicit products and ordered crime

R Rawat, SA AJAGBE, AOKI Olukayode - 2022 - researchsquare.com
The techniques for forecasting crime in detail before it occurs, or creating an" Automated
Machine" to assist police officers, relieves the strain on cops while also aiding in crime …

A new image compression-encryption scheme based on compressive sensing & classical AES algorithm

A Hadj Brahim, A Ali Pacha, N Hadj Said - Multimedia Tools and …, 2023 - Springer
In recent years, many compressive sensing methods have been suggested to encrypt and
compress images. However, these algorithms have some flaws in terms of the quality of the …

AESRSA: a new cryptography key for electronic health record security

SA Ajagbe, H Florez, JB Awotunde - International Conference on Applied …, 2022 - Springer
When compared to old paper record systems, privacy concerns are likely the most significant
impediment to the adoption of electronic health record (EHR) systems, which are regarded …

[PDF][PDF] Wake-Up Security: Effective Security Improvement Mechanism for Low Power Internet of Things.

SW Yun, NE Park, IG Lee - Intelligent Automation & Soft …, 2023 - cdn.techscience.cn
As time and space constraints decrease due to the development of wireless communication
network technology, the scale and scope of cyberattacks targeting the Internet of Things …

Advanced Encryption Standard (AES)-Based Text Encryption for Near Field Communication (NFC) Using Huffman Compression

SA Ajagbe, OD Adeniji, AA Olayiwola, SF Abiona - SN Computer Science, 2024 - Springer
Data encryption which is associated with cryptography is necessary to prevent the
compromise of Personally Identifying. Multi-level security is ensured by combining the …

[PDF][PDF] P-acohoneybee: a novel load balancer for cloud computing using mathematical approach

SA Ajagbe, MO Oyediran, A Nayyar, JA Awokola… - 2022 - researchgate.net
Cloud computing is a collection of disparate resources or services, a web of massive
infrastructures, which is aimed at achieving maximum utilization with higher availability at a …

Text encryption with advanced encryption standard (AES) for near field communication (NFC) using Huffman compression

OD Adeniji, OE Akinola, AO Adesina… - … Conference on Applied …, 2022 - Springer
Abstract The combination of Huffman Code with some Cryptographic Algorithms such as
symmetric encryption algorithms will guarantee multi-level security. Huffman code can …

A Multivariate Convertible Group Signature Scheme

S Omar, S Padhye, D Dey - SN Computer Science, 2023 - Springer
Post-quantum digital signatures are going to play a vital role in data integrity and data
authentication in the coming years. Multivariate cryptography is one of the main alternatives …