Techniques for predicting dark web events focused on the delivery of illicit products and ordered crime
The techniques for forecasting crime in detail before it occurs, or creating an" Automated
Machine" to assist police officers, relieves the strain on cops while also aiding in crime …
Machine" to assist police officers, relieves the strain on cops while also aiding in crime …
A new image compression-encryption scheme based on compressive sensing & classical AES algorithm
In recent years, many compressive sensing methods have been suggested to encrypt and
compress images. However, these algorithms have some flaws in terms of the quality of the …
compress images. However, these algorithms have some flaws in terms of the quality of the …
AESRSA: a new cryptography key for electronic health record security
When compared to old paper record systems, privacy concerns are likely the most significant
impediment to the adoption of electronic health record (EHR) systems, which are regarded …
impediment to the adoption of electronic health record (EHR) systems, which are regarded …
[PDF][PDF] Wake-Up Security: Effective Security Improvement Mechanism for Low Power Internet of Things.
As time and space constraints decrease due to the development of wireless communication
network technology, the scale and scope of cyberattacks targeting the Internet of Things …
network technology, the scale and scope of cyberattacks targeting the Internet of Things …
Advanced Encryption Standard (AES)-Based Text Encryption for Near Field Communication (NFC) Using Huffman Compression
Data encryption which is associated with cryptography is necessary to prevent the
compromise of Personally Identifying. Multi-level security is ensured by combining the …
compromise of Personally Identifying. Multi-level security is ensured by combining the …
[PDF][PDF] P-acohoneybee: a novel load balancer for cloud computing using mathematical approach
Cloud computing is a collection of disparate resources or services, a web of massive
infrastructures, which is aimed at achieving maximum utilization with higher availability at a …
infrastructures, which is aimed at achieving maximum utilization with higher availability at a …
Text encryption with advanced encryption standard (AES) for near field communication (NFC) using Huffman compression
Abstract The combination of Huffman Code with some Cryptographic Algorithms such as
symmetric encryption algorithms will guarantee multi-level security. Huffman code can …
symmetric encryption algorithms will guarantee multi-level security. Huffman code can …
A Multivariate Convertible Group Signature Scheme
Post-quantum digital signatures are going to play a vital role in data integrity and data
authentication in the coming years. Multivariate cryptography is one of the main alternatives …
authentication in the coming years. Multivariate cryptography is one of the main alternatives …