Secure fiber-optic communication system based on Internet-accessible multipath transmission of ciphertext fragments

Y **, Y Qi, Y Chen, W Chen, W Li, N Zhu - Optics Express, 2021 - opg.optica.org
A secure fiber-optic communication system based on Internet-accessible multipath
transmission of ciphertext fragment (MTCF) technology is proposed and demonstrated in this …

Personal identifiable information privacy model for securing of users' attributes transmitted to a federated cloud environment

M Abur, S Junaidu, A Obiniyi - International Journal of Information …, 2022 - Springer
One of the security issues affecting Federated Cloud Environment users is privacy. It is the
ability to secure and control the Personal Identifiable Information (PII) of a user during and …

Performance analysis of cryptographic algorithms for cloud security

GS Vennela, NV Varun, N Neelima… - 2018 Second …, 2018 - ieeexplore.ieee.org
Cloud generally relates to storing, processing and managing of data over a network. The
cloud provides mainly three services, storage as a service, platform as a service and …

Piecewise symmetric magic cube: application to text cryptography

N Rani, V Mishra, B Singh - Multimedia Tools and Applications, 2023 - Springer
This article propounds a Piecewise Symmetric Magic Cube (PSMC), the properties of which
have reinvigorated its application to text encryption. A method has been introduced for the …

Application of Genetics Algorithms in Cryptography

P Pekarčík, E Chovancová… - 2024 IEEE 28th …, 2024 - ieeexplore.ieee.org
One of the most essential subfields of modern IT is undoubtedly cybersecurity. The
cybersecurity practice, also known as cryptology, combines various disciplines like computer …

Evaluation of Various Cryptographic Techniques Based on File Size on Cloud Storage Security

K Mahalakshmi, K Kuppusamy - International Conference on Computing …, 2022 - Springer
Cloud storage and Internet applications are growing rapidly in the recent years. These
applications are used by millions of users and controlled by authorized administrators. With …

[PDF][PDF] Securing Game Code using AES and Logistic Map

SE Harfoush - 2023 - researchgate.net
The thesis paper presents a comprehensive investigation into securing game code by
utilizing the advanced encryption standard (AES) and logistic map. The primary aim of this …

[PDF][PDF] A Novel Key Exchange Protocol using Logic Algebra for the Factorization Problem.

J **ao, A Neupane, HF Fayoumi, W Sun - ICISSP, 2022 - pdfs.semanticscholar.org
Our current key exchange protocols are at risk of failing to keep private data secret due to
advancements in technology. Therefore, there is a need to develop an efficient and secure …

[PDF][PDF] Towards Objective Comparison of Security Algorithms for Resource-Constrained IoT Devices

M Fischer, R Tönjes - 2024 - opus.hs-osnabrueck.de
Networked sensors are strategically deployed to gather real-world data, thereby facilitating
the implementation of cutting-edge technologies like the Internet of Things (IoT) and Cyber …

[PDF][PDF] Performance Analysis of Blowfish, IDEA and AES Encryption Algorithms

MM Abay - International Journal, 2019 - academia.edu
Network and internet applications are growing rapidly in the recent past. These applications
are used by thousand of users and controlled by different administrative entities. It is mainly …