Enhanced multimodal biometric recognition approach for smart cities based on an optimized fuzzy genetic algorithm
Biometric security is a major emerging concern in the field of data security. In recent years,
research initiatives in the field of biometrics have grown at an exponential rate. The …
research initiatives in the field of biometrics have grown at an exponential rate. The …
Design of pseudo-random number generator from turbulence padded chaotic map
Transmission of the information in any form requires security. Security protocols used for
communication rely on the use of random numbers. Pseudo-random numbers are required …
communication rely on the use of random numbers. Pseudo-random numbers are required …
An efficient lightweight privacy-preserving mechanism for industry 4.0 based on elliptic curve cryptography
S Velliangiri, R Manoharn… - IEEE Transactions …, 2021 - ieeexplore.ieee.org
The present trend of automation anddata interchange in industrial technology is known as
Industry 4.0. Industry 4.0 is altering its next generation of distribution networks by making …
Industry 4.0. Industry 4.0 is altering its next generation of distribution networks by making …
Cancelable Iris template for secure authentication based on random projection and double random phase encoding
Biometric recognition approaches have overwhelmed major issues in traditional
authentication systems. Privacy invasion and security are the needed features in the …
authentication systems. Privacy invasion and security are the needed features in the …
A new modified Skew Tent Map and its application in pseudo-random number generator
Everyday, a vast amount of information is created and shared on the internet. Security steps
and methods are needed to ensure the data is sent and stored safely. Random numbers are …
and methods are needed to ensure the data is sent and stored safely. Random numbers are …
Elliptic curve signcryption-based mutual authentication protocol for smart cards
In the modern computing environment, smart cards are being used extensively, which are
intended to authenticate a user with the system or server. Owing to the constrictions of …
intended to authenticate a user with the system or server. Owing to the constrictions of …
Ensemble machine learning methods to predict the balancing of ayurvedic constituents in the human body
In this paper, we demonstrate the result of certain machine-learning methods like support
vector machine (SVM), naive Bayes (NB), decision tree (DT), k-nearest neighbor (KNN) …
vector machine (SVM), naive Bayes (NB), decision tree (DT), k-nearest neighbor (KNN) …
Enhanced WSN routing protocol for internet of things to process multimedia big data
Due to the massive use of wireless Internet of Things (IoT), the advent of multimedia-big-
data in recent decades poses numerous obstacles for successful contact with the virtual era …
data in recent decades poses numerous obstacles for successful contact with the virtual era …
Security analytics
Security analytics is a cyber security strategy that focuses on analyzing data to create robust
cyber security interventions. It implies the usage of security analytic tools to improve the …
cyber security interventions. It implies the usage of security analytic tools to improve the …
Small prime divisors attack and countermeasure against the rsa-otp algorithm
S Sarna, R Czerwinski - Electronics, 2021 - mdpi.com
One-time password algorithms are widely used in digital services to improve security.
However, many such solutions use a constant secret key to encrypt (process) one-time …
However, many such solutions use a constant secret key to encrypt (process) one-time …