A survey on mobile payment request verification over cloud using key distribution
Payment request examination of some of the cryptography's most widely used encryption
algorithms, with the goal of first identifying as many flaws and vulnerabilities as possible …
algorithms, with the goal of first identifying as many flaws and vulnerabilities as possible …
Enhancement of Security of Diffie-Hellman Key Exchange Protocol using RSA Cryptography.
Cryptography is related and referred to as the secured transmission of messages amongst
the sender and the intended receiver by ensuring confidentiality, integrity, and …
the sender and the intended receiver by ensuring confidentiality, integrity, and …
Cybersecurity for embedded systems: a review
AI Molcut, S Lica, I Lie - 2022 International Symposium on …, 2022 - ieeexplore.ieee.org
Encryption is the process of encoding the sensitive data so that only authorized parties or
personnel can access it. Without encryption, some critical data or information would be at …
personnel can access it. Without encryption, some critical data or information would be at …
Intelligent physiological signal infosecurity: Case study in photoplethysmography (PPG) signal
CH Lin, JX Wu, NS Pai, PY Chen, CM Li… - IET Signal …, 2022 - Wiley Online Library
A wrist‐based photoplethysmography (PPG) tool offers a simple and non‐invasive approach
for applications in vital sign monitoring and healthcare. However, in a telecare network …
for applications in vital sign monitoring and healthcare. However, in a telecare network …
Handling Secret Key Compromise by Deriving Multiple Asymmetric Keys based on Diffie-Hellman Algorithm
A collection of connected things or nodes that collect information and send it through
communication channels is known as the Internet of Things (IoT). Maintaining the …
communication channels is known as the Internet of Things (IoT). Maintaining the …
Validate Merchant Server for secure payment using Key Distribution
Nowadays, growing and competitiveness of a financial sector and e-healthcare application
developed rapidly and quicker ever so that mobile payment plays a vital role to make easier …
developed rapidly and quicker ever so that mobile payment plays a vital role to make easier …
Symmetric key generation and distribution using Diffie-Hellman algorithm
Transfer of data over a network is one of the most endangered things to look for. As the
cases of data leaks and theft are increasing exponentially, there is a need of a secure …
cases of data leaks and theft are increasing exponentially, there is a need of a secure …
Boosting Digital Safeguards: Blending Cryptography and Steganography
A Maiti, S Laha, R Upadhaya, S Biswas… - arxiv preprint arxiv …, 2024 - arxiv.org
In today's digital age, the internet is essential for communication and the sharing of
information, creating a critical need for sophisticated data security measures to prevent …
information, creating a critical need for sophisticated data security measures to prevent …
Extended Diffie-Hellman protocol based on exponential and multiplication operations over modular arithmetic
In this modern digital world, a huge volume of data is transmitted over the internet. This data
transmission is done through the communication channel and the communication channel …
transmission is done through the communication channel and the communication channel …
LSNCP: Lightweight and Secure Numeric Comparison Protocol for Wireless Body Area Networks
Wireless body area networks (WBANs) have been deployed in numerous applications,
where the most common communication technology is Bluetooth. Bluetooth uses the …
where the most common communication technology is Bluetooth. Bluetooth uses the …