A survey on mobile payment request verification over cloud using key distribution

A Saranya, R Naresh - … on Recent Trends in Computer Science …, 2022 - ieeexplore.ieee.org
Payment request examination of some of the cryptography's most widely used encryption
algorithms, with the goal of first identifying as many flaws and vulnerabilities as possible …

Enhancement of Security of Diffie-Hellman Key Exchange Protocol using RSA Cryptography.

C Gupta, NVS Reddy - Journal of Physics: Conference Series, 2022 - iopscience.iop.org
Cryptography is related and referred to as the secured transmission of messages amongst
the sender and the intended receiver by ensuring confidentiality, integrity, and …

Cybersecurity for embedded systems: a review

AI Molcut, S Lica, I Lie - 2022 International Symposium on …, 2022 - ieeexplore.ieee.org
Encryption is the process of encoding the sensitive data so that only authorized parties or
personnel can access it. Without encryption, some critical data or information would be at …

Intelligent physiological signal infosecurity: Case study in photoplethysmography (PPG) signal

CH Lin, JX Wu, NS Pai, PY Chen, CM Li… - IET Signal …, 2022 - Wiley Online Library
A wrist‐based photoplethysmography (PPG) tool offers a simple and non‐invasive approach
for applications in vital sign monitoring and healthcare. However, in a telecare network …

Handling Secret Key Compromise by Deriving Multiple Asymmetric Keys based on Diffie-Hellman Algorithm

J Arora, K Saluja, S Gupta, S Sharma… - 2023 8th International …, 2023 - ieeexplore.ieee.org
A collection of connected things or nodes that collect information and send it through
communication channels is known as the Internet of Things (IoT). Maintaining the …

Validate Merchant Server for secure payment using Key Distribution

A Saranya, R Naresh - … Security, Privacy and Networking: Proceedings of …, 2022 - Springer
Nowadays, growing and competitiveness of a financial sector and e-healthcare application
developed rapidly and quicker ever so that mobile payment plays a vital role to make easier …

Symmetric key generation and distribution using Diffie-Hellman algorithm

K Purohit, A Kumar, M Upadhyay, K Kumar - Soft Computing: Theories and …, 2020 - Springer
Transfer of data over a network is one of the most endangered things to look for. As the
cases of data leaks and theft are increasing exponentially, there is a need of a secure …

Boosting Digital Safeguards: Blending Cryptography and Steganography

A Maiti, S Laha, R Upadhaya, S Biswas… - arxiv preprint arxiv …, 2024 - arxiv.org
In today's digital age, the internet is essential for communication and the sharing of
information, creating a critical need for sophisticated data security measures to prevent …

Extended Diffie-Hellman protocol based on exponential and multiplication operations over modular arithmetic

SC Kumain, M Deshmukh… - International Journal of …, 2024 - inderscienceonline.com
In this modern digital world, a huge volume of data is transmitted over the internet. This data
transmission is done through the communication channel and the communication channel …

LSNCP: Lightweight and Secure Numeric Comparison Protocol for Wireless Body Area Networks

H Yin, X Huang, B **ng, J Huang, X Sun… - IEEE Internet of …, 2023 - ieeexplore.ieee.org
Wireless body area networks (WBANs) have been deployed in numerous applications,
where the most common communication technology is Bluetooth. Bluetooth uses the …