Enhanced multimodal biometric recognition approach for smart cities based on an optimized fuzzy genetic algorithm

V Rajasekar, B Predić, M Saracevic, M Elhoseny… - Scientific Reports, 2022 - nature.com
Biometric security is a major emerging concern in the field of data security. In recent years,
research initiatives in the field of biometrics have grown at an exponential rate. The …

Design of pseudo-random number generator from turbulence padded chaotic map

S Krishnamoorthi, P Jayapaul, RK Dhanaraj… - Nonlinear …, 2021 - Springer
Transmission of the information in any form requires security. Security protocols used for
communication rely on the use of random numbers. Pseudo-random numbers are required …

An efficient lightweight privacy-preserving mechanism for industry 4.0 based on elliptic curve cryptography

S Velliangiri, R Manoharn… - IEEE Transactions …, 2021 - ieeexplore.ieee.org
The present trend of automation anddata interchange in industrial technology is known as
Industry 4.0. Industry 4.0 is altering its next generation of distribution networks by making …

Cancelable Iris template for secure authentication based on random projection and double random phase encoding

V Rajasekar, J Premalatha, K Sathya - Peer-to-Peer Networking and …, 2021 - Springer
Biometric recognition approaches have overwhelmed major issues in traditional
authentication systems. Privacy invasion and security are the needed features in the …

A new modified Skew Tent Map and its application in pseudo-random number generator

T Umar, M Nadeem, F Anwer - Computer Standards & Interfaces, 2024 - Elsevier
Everyday, a vast amount of information is created and shared on the internet. Security steps
and methods are needed to ensure the data is sent and stored safely. Random numbers are …

Elliptic curve signcryption-based mutual authentication protocol for smart cards

AK Singh, A Solanki, A Nayyar, B Qureshi - Applied Sciences, 2020 - mdpi.com
In the modern computing environment, smart cards are being used extensively, which are
intended to authenticate a user with the system or server. Owing to the constrictions of …

Ensemble machine learning methods to predict the balancing of ayurvedic constituents in the human body

V Rajasekar, S Krishnamoorthi, M Saracevic… - Computer …, 2022 - yadda.icm.edu.pl
In this paper, we demonstrate the result of certain machine-learning methods like support
vector machine (SVM), naive Bayes (NB), decision tree (DT), k-nearest neighbor (KNN) …

Enhanced WSN routing protocol for internet of things to process multimedia big data

V Rajasekar, P Jayapaul, S Krishnamoorthi… - Wireless Personal …, 2022 - Springer
Due to the massive use of wireless Internet of Things (IoT), the advent of multimedia-big-
data in recent decades poses numerous obstacles for successful contact with the virtual era …

Security analytics

V Rajasekar, J Premalatha, RK Dhanaraj - System Assurances, 2022 - Elsevier
Security analytics is a cyber security strategy that focuses on analyzing data to create robust
cyber security interventions. It implies the usage of security analytic tools to improve the …

Small prime divisors attack and countermeasure against the rsa-otp algorithm

S Sarna, R Czerwinski - Electronics, 2021 - mdpi.com
One-time password algorithms are widely used in digital services to improve security.
However, many such solutions use a constant secret key to encrypt (process) one-time …