Comprehensive review and analysis of cryptography techniques in cloud computing

K Sasikumar, S Nagarajan - IEEE Access, 2024 - ieeexplore.ieee.org
Cloud computing is a fast-growing industry that offers various online services, including
software, computing resources, and databases. Its payment model is usage-based, whereas …

DNA encoding schemes herald a new age in cybersecurity for safeguarding digital assets

S Aqeel, SU Khan, AS Khan, M Alharbi, S Shah… - Scientific Reports, 2024 - nature.com
With the urge to secure and protect digital assets, there is a need to emphasize the
immediacy of taking measures to ensure robust security due to the enhancement of cyber …

[PDF][PDF] Security and qos (quality of service) related current challenges in iot

S Pawar, M Lokhande, S Thite, J AP… - … Journal of Electronics …, 2023 - researchgate.net
IoT technologies have permitted the linking of devices all around the globe through the
Internet. Because of their capacity to send, receive, and analyze data, the gadgets are …

[PDF][PDF] Cyber Attack Link Formation in a Network

S Rawther, S Sathyalakshmi - International Journal of Engineering …, 2023 - researchgate.net
The threat of cyber-attacks has become a major concern for organizations of all sizes. The
linkage between different components is an important factor in detecting and mitigating …

[PDF][PDF] An enhanced playfair algorithm with dynamic matrix using the novel multidimensional element-in-grid sequencer (MEGS)

JCT Arroyo, AM Sison, RP Medina… - International Journal of …, 2022 - researchgate.net
This study enhanced the Playfair algorithm with the novel Multidimensional Element-in-Grid
Sequencer (MEGS). A 16x16 dynamic matrix with a new character sequencing scheme is …

EXPLORING SECURE METHODS FOR ENSURING DATA INTEGRITY: A THEORETICAL ANALYSIS OF CRYPTOGRAPHIC AND DETECTION TECHNIQUES

H Garcia Martinez - 2024 - scholarworks.lib.csusb.edu
This study investigates cryptographic methods to ensure data integrity within cloud
environments, with a particular focus on comparing the security, performance, and efficiency …

[PDF][PDF] Two Level Privacy Preserving Model for Association Rule Mining in Cloud Using Deep-SVM Method

K Mangayarkkarasi - Indian Journal …, 2024 - sciresol.s3.us-east-2.amazonaws …
Abstract Background/Objectives: It is becoming more common for data owners to outsource
data mining tasks and storage to cloud service providers as a result of the rising costs of …

Evaluation of Usability of E-Commerce Websites in Pakistan Using System Usability Scale and Heuristics Methods

A Ashraf, S Aqeel, AH Muhammad - Fraud Prevention, Confidentiality …, 2023 - igi-global.com
Online shop** platforms “Draz. pk,”“Homesop**. pk,” and “Telemart. pk,” were the most
often used online stores in Pakistan. E-commerce platforms have not achieved their …

[PDF][PDF] A Cryptographic Test of Randomness, Entropy, and Brute Force Attack on the Modified Playfair Algorithm with the Novel Dynamic Matrix

JCT Arroyo, AM Sison, RP Medina, AJP Delima - researchgate.net
One critical concern in designing a cryptographic algorithm is its randomness. The
randomness test examines the quality of random numbers generated by cryptographic …