Design and implementation of secure and reliable information interaction architecture for digital twins

Q Wang, W Wu, L Qian, Y Cai, J Qian… - China …, 2023 - ieeexplore.ieee.org
In order to improve the comprehensive defense capability of data security in digital twins
(DTs), an information security interaction architecture is proposed in this paper to solve the …

A Hybrid Cryptography Approach Using Symmetric, Asymmetric and DNA Based Encryption

V Yadav, M Kumar - 2023 3rd International Conference on …, 2023 - ieeexplore.ieee.org
Cloud computing is simply exchanging data over a digital network to a remote location. In
spite of security risks, cloud computing has become a necessity of human digital life …

Key Cryptographic Methods in the Cloud: A Comparative Study

V Yadav, M Kumar - 2023 3rd International Conference on …, 2023 - ieeexplore.ieee.org
With cloud computing becoming an inseparable part of human daily life and making its way
in every field of technology during the last decade with smarter human generation and …

Text encryption using Bi-amold cat map and modulus operation

EH Rachmawanto, R Zulfiningrum… - … on Application for …, 2021 - ieeexplore.ieee.org
This research proposes an encryption method in text that adopts the chaotic method which is
popularly used in 2D matrices such as images. Chaos methods such as Arnold's Cat Map …

A secure document archive implemented using multiple encryption

D Agnihotri, S Ahmed, D Darekar… - … on Smart Electronics …, 2020 - ieeexplore.ieee.org
Documents are something that provides information or can be a certification for someone or
also can be a legal report. The theft of such important documents/certificates can …

Exploring Modern Cryptographic Algorithms: An Experimental Analysis

B Sankhyan, S Sharma, M Singh - 2024 15th International …, 2024 - ieeexplore.ieee.org
In the modern era dominated by digital communication, security of data is of utmost concern.
Modern cryptographic algorithms plays an important role to secure the communication …

Enterprise Email Server Data Protection System using Geo-Fence Technology and Machine Learning

K Vinitha, R Nila, R Rajkumar… - … Computing and Data …, 2022 - ieeexplore.ieee.org
Data sharing and protection is becoming an increasingly important element of end users'
daily life as they access various systems, services, and apps. Data disclosure often occurs in …

Performance Analysis of AES and DESede on the Sensitive Data Stored in HDFS

A Kaushik, VK Srivastava - 2020 2nd International Conference …, 2020 - ieeexplore.ieee.org
Hadoop is a distributed framework for storing and analyzing big data. Organizations store
their sensitive information on HDFS and use MapReduce to analyze the data. Therefore …

Enhancing the performance of cryptographic algorithms for secured data transmission

K Assa-Agyei - 2024 - irep.ntu.ac.uk
Cryptography is crucial in the digital age for protecting data integrity, verifying users and
entities, and maintaining the secrecy of sensitive information. This is accomplished by …

Enhancing Communication Security with 3DES and Spread Spectrum Technologies

T Meng, Y Gu, R Yang, J Zong… - Journal of Physics …, 2023 - iopscience.iop.org
As society moves towards the digital age, data security has become an increasingly
important issue in wireless communication. To address this problem, the use of encryption …