Drone cybersecurity issues, solutions, trend insights and future perspectives: a survey
This paper presented an exhaustive survey on the security and privacy issues of drones.
These security concerns were thoroughly dissected, particularly the aspect of cybersecurity …
These security concerns were thoroughly dissected, particularly the aspect of cybersecurity …
[PDF][PDF] A comprehensive review of honey encryption scheme
We present a comprehensive survey of the Honey Encryption (HE) scheme. Honey
Encryption is an encryption scheme that provides resilience against brute-force attack by …
Encryption is an encryption scheme that provides resilience against brute-force attack by …
HoneyDetails: A prototype for ensuring patient's information privacy and thwarting electronic health record threats based on decoys
A Esther Omolara, A Jantan… - Health informatics …, 2020 - journals.sagepub.com
Advancements in electronic health record system allow patients to store and selectively
share their medical records as needed with doctors. However, privacy concerns represent …
share their medical records as needed with doctors. However, privacy concerns represent …
Reinforcing the security of instant messaging systems using an enhanced honey encryption scheme: the case of WhatsApp
In this paper, an enhanced honey encryption (HE) scheme for reinforcing the security of
instant messaging systems and confounding the time and resources of malicious persons is …
instant messaging systems and confounding the time and resources of malicious persons is …
[PDF][PDF] Epilepsy Radiology Reports Classification Using Deep Learning Networks.
The automatic and accurate classification of Magnetic Resonance Imaging (MRI) radiology
report is essential for the analysis and interpretation epilepsy and non-epilepsy. Since the …
report is essential for the analysis and interpretation epilepsy and non-epilepsy. Since the …
[PDF][PDF] Modified honey encryption scheme for encoding natural language message
AE Omolara, A Jantan - International Journal of Electrical and …, 2019 - researchgate.net
Conventional encryption schemes are susceptible to brute-force attacks. This is because
bytes encode utf8 (or ASCII) characters. Consequently, an adversary that intercepts a …
bytes encode utf8 (or ASCII) characters. Consequently, an adversary that intercepts a …
Honey2fish-a hybrid encryption approach for improved password and message security
S Jain, CH Muntean, R Verma - … 9th Intl Conference on Big Data …, 2023 - ieeexplore.ieee.org
Nowadays, there is an upsurge in reliance on web usage. Many of these web applications
make use of password-based authentication. Ensuring a secure password protection …
make use of password-based authentication. Ensuring a secure password protection …
Enhanced honey encryption algorithm for increasing message space against brute force attack
KSM Moe, T Win - 2018 15th international conference on …, 2018 - ieeexplore.ieee.org
In the era of digitization, data security is a vital role in message transmission and all systems
that deal with users require stronger encryption techniques that against brute force attack …
that deal with users require stronger encryption techniques that against brute force attack …
Fooling an unbounded adversary with a short key, repeatedly: The honey encryption perspective
X Li, Q Tang, Z Zhang - 2nd Conference on Information-Theoretic …, 2021 - drops.dagstuhl.de
This article is motivated by the classical results from Shannon that put the simple and
elegant one-time pad away from practice: key length has to be as large as message length …
elegant one-time pad away from practice: key length has to be as large as message length …
Use of neural network based prediction algorithms for powering up smart portable accessories
Emerging Trends in the use of smart portable accessories, particularly within the context of
the Internet of Things (IoT), where smart sensor devices are employed for data gathering …
the Internet of Things (IoT), where smart sensor devices are employed for data gathering …