Journal articles on the topic 'Cryptography Authentication'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Cryptography Authentication.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
kumar, N. Shantha, and Dr Hareesh K. "A Primitive Proposal of an Algorithm for IP and Mac Based Data Aggregation and message authentication in Wireless Sensor Networks." International Journal of Soft Computing and Engineering 9, no. 4 (2019): 14–17. http://dx.doi.org/10.35940/ijsce.c3322.109119.
Full textN.Shantha, Kumar, and Hareesh.K. "A Primitive Proposal of an Algorithm for IP and Mac Based Data Aggregation and message authentication in Wireless Sensor Networks." International Journal of Soft Computing and Engineering (IJSCE) 9, no. 4 (2019): 14–17. https://doi.org/10.35940/ijsce.C3322.109119.
Full textTridib, Chakraborty, Ghosh Sudeep, Ghosh Trishita, Md. Mizan Chowdhury, and Karmakar Suparna. "(3, 3) Visual Cryptography for Online Certificate Authentication." International Journal of Engineering and Advanced Technology (IJEAT) 9, no. 6 (2020): 152–56. https://doi.org/10.35940/ijeat.F1302.089620.
Full textKshirsagar, Padmavati N., and S. Pratap singh. "A Review of Secure Pub Sub System." Asian Journal of Electrical Sciences 3, no. 2 (2014): 56–59. http://dx.doi.org/10.51983/ajes-2014.3.2.1921.
Full textKlimushyn, Petro, Tetiana Solianyk, Oleksandr Mozhaev, Vitalii Nosov, Tetiana Kolisnyk, and Vasily Yanov. "HARDWARE SUPPORT PROCEDURES FOR ASYMMETRIC AUTHENTICATION OF THE INTERNET OF THINGS." Innovative Technologies and Scientific Solutions for Industries, no. 4 (18) (December 10, 2021): 31–39. http://dx.doi.org/10.30837/itssi.2021.18.031.
Full textAhmed, Mubbashir. "Lightweight Cryptographic Algorithm Development Using Fundamental Cryptographic Techniques." VFAST Transactions on Software Engineering 13, no. 1 (2025): 178–92. https://doi.org/10.21015/vtse.v13i1.2050.
Full textABIDIN, AYSAJAN, and JAN-Å. KE LARSSON. "VULNERABILITY OF "A NOVEL PROTOCOL-AUTHENTICATION ALGORITHM RULING OUT A MAN-IN-THE-MIDDLE ATTACK IN QUANTUM CRYPTOGRAPHY"." International Journal of Quantum Information 07, no. 05 (2009): 1047–52. http://dx.doi.org/10.1142/s0219749909005754.
Full textMitchell, Chris. "Authentication using cryptography." Information Security Technical Report 2, no. 2 (1997): 25–32. http://dx.doi.org/10.1016/s1363-4127(97)81326-x.
Full textVyshali Rao K P. "Analytical Study of Authentication and Lightweight Security Techniques in 5G-Enabled IoT Networks." Journal of Information Systems Engineering and Management 10, no. 15s (2025): 215–27. https://doi.org/10.52783/jisem.v10i15s.2445.
Full textPasunuru, Sreekanth, and Anil Kumar Malipeddi. "Cryptography in IoT: Securing the Next Generation of Connected Devices." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 09, no. 01 (2025): 1–6. https://doi.org/10.55041/ijsrem6584.
Full textMANURUNG, HOTLER. "PERANCANGAN PERANGKAT LUNAK PEMBELAJARAN AUTHENTICATION DAN DIGITAL SIGNATURE SCHEME DENGAN METODE SIMULASI SCHNORR." Jurnal Informatika Kaputama (JIK) 3, no. 2 (2019): 101–9. http://dx.doi.org/10.59697/jik.v3i2.372.
Full textMolotkov, S. N. "How many sessions of quantum key distribution are allowed from the first launch to the next restart of the system?" Laser Physics 34, no. 4 (2024): 045202. http://dx.doi.org/10.1088/1555-6611/ad2928.
Full textDarko, Cyprian Danso. "Data Security in the Cloud Using Multi-Modal Bio-Cryptographic Authentication." Advances in Multidisciplinary and scientific Research Journal Publication 10, no. 4 (2022): 9–14. http://dx.doi.org/10.22624/aims/digital/v10n4p2.
Full textDamaševičius, Robertas, Rytis Maskeliūnas, Egidijus Kazanavičius, and Marcin Woźniak. "Combining Cryptography with EEG Biometrics." Computational Intelligence and Neuroscience 2018 (2018): 1–11. http://dx.doi.org/10.1155/2018/1867548.
Full textGodse, Sachin P., and Parikshit N. Mahalle. "A Computational Analysis of ECC Based Novel Authentication Scheme in VANET." International Journal of Electrical and Computer Engineering (IJECE) 8, no. 6 (2018): 5268. http://dx.doi.org/10.11591/ijece.v8i6.pp5268-5277.
Full textSyed, Zubair Yuneeb Shakeeb Ahmed Tejas B. N. Sneha Singh Dr.C Nandini and Dr. Jahnavi Shankar. "Advanced Secured Key Generation Using User Face and Hand Geometry." INTERNATIONAL JOURNAL OF EMERGING TRENDS IN ENGINEERING AND DEVELOPMENT (IJETED) 15, no. 1 (2025): 52–61. https://doi.org/10.5281/zenodo.15280636.
Full textPadmashree, M. G., J. S. Arunalatha, and K. R. Venugopal. "EBASKET ECC Blended Authentication and Session Key Establishment Technique for IoT." International Journal of Innovative Technology and Exploring Engineering 10, no. 11 (2021): 20–28. http://dx.doi.org/10.35940/ijitee.k9461.09101121.
Full textPadmashree, M. G., J. S. Arunalatha, and K. R. Venugopal. "EBASKET: ECC Blended Authentication and Session Key Establishment Technique for IoT." International Journal of Innovative Technology and Exploring Engineering (IJITEE) 10, no. 11 (2021): 20–28. https://doi.org/10.35940/ijitee.K9461.09101121.
Full textTyagi, Shivani, Manish Kumar, Dharambeer Singh, and Hariom Tyagi. "Biometric Cryptosystem Based On Fingerprint Authentication And Cryptography Technique." International Research Journal of Parroha Multiple Campus 1, no. 1 (2022): 26–39. http://dx.doi.org/10.61916/prmn.2023.v0101.004.
Full textTyagi, S., M. Kumar, D. Singh, and H. Tyagi. "Biometric Cryptosystem Based On Fingerprint Authentication And Cryptography Technique." International Research Journal of Parroha Multiple Campus (IRJPMC) 1, no. 1 (2023): 26–39. https://doi.org/10.5281/zenodo.10258787.
Full textSatapure, Pratiksha. "Different Methods of Encryption and Decryption." International Journal for Research in Applied Science and Engineering Technology 9, no. 11 (2021): 170–77. http://dx.doi.org/10.22214/ijraset.2021.38732.
Full textPratarshi, Saha, Gurung Sandeep, and Krishanu Ghose Kunal. "HYBRIDIZATION OF DCT BASED STEGANOGRAPHY AND RANDOM GRIDS." International Journal of Network Security & Its Applications (IJNSA) 5, no. 4 (2013): 163–79. https://doi.org/10.5281/zenodo.4724281.
Full textChiou, Shin-Yan. "Secure Method for Biometric-Based Recognition with Integrated Cryptographic Functions." BioMed Research International 2013 (2013): 1–12. http://dx.doi.org/10.1155/2013/623815.
Full textAdithya, C. H. "Web based Biometric Authentication for Data Security." Journal of Network Security and Data Mining 6, no. 3 (2023): 11–16. https://doi.org/10.5281/zenodo.8181299.
Full textRuba, N., and A. S. A. Khadir. "Session password Blum–Goldwasser cryptography based user three layer authentication for secured financial transaction." Scientific Temper 15, no. 01 (2024): 1826–31. http://dx.doi.org/10.58414/scientifictemper.2024.15.1.34.
Full textZill, E. Huma, Ul Rahman Jamshaid, Suleman Muhammad, and Anjum Naveed. "Cryptographic method based on natural-elzaki transform." i-manager’s Journal on Mathematics 11, no. 1 (2022): 39. http://dx.doi.org/10.26634/jmat.11.1.18511.
Full textTuhin Banerjee. "Post-quantum cryptography: Reshaping the future of identity and access management." World Journal of Advanced Engineering Technology and Sciences 15, no. 2 (2025): 350–56. https://doi.org/10.30574/wjaets.2025.15.2.0567.
Full textChuah, Chai Wen, Nur Ziadah Harun, and Isredza Rahmi A. Hamid. "Key derivation function: key-hash based computational extractor and stream based pseudorandom expander." PeerJ Computer Science 10 (August 23, 2024): e2249. http://dx.doi.org/10.7717/peerj-cs.2249.
Full textZhang, Shuai, Lei Sun, Xiuqing Mao, Cuiyun Hu, and Peiyuan Liu. "Review on EEG-Based Authentication Technology." Computational Intelligence and Neuroscience 2021 (December 24, 2021): 1–20. http://dx.doi.org/10.1155/2021/5229576.
Full textSingh Bhadoria, Anurag, and Anurag Jain. "A Review of Digital Signature Using Different Elliptic Cryptography Technique." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 15, no. 8 (2016): 6976–78. http://dx.doi.org/10.24297/ijct.v15i8.1499.
Full textBabu, Shaikh, Ahankare Anand, Vatse Aditya, Waghmare Ajinkya, and Prof M. P. Shinde. "VISUAL CRYPTOGRAPHY: STRENGTHENING BANKING AUTHENTICATION WITH IMAGE PROCESSING." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 07, no. 10 (2023): 1–11. http://dx.doi.org/10.55041/ijsrem26471.
Full textFahriani, Nuniek, and Onny Kartika Waluya. "Cryptography on Audio Files Using the Blowfish Algorithm." JEECS (Journal of Electrical Engineering and Computer Sciences) 3, no. 1 (2018): 341–52. http://dx.doi.org/10.54732/jeecs.v3i1.139.
Full textMitra, Adrish, Chirag Bihani, Jaimeet Singh, Sanath Kumar M Kashyap, and Mrs Suchitha H S. "Advancing IoT Network Communications with PBFT Consensus and ECC Authentication." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 09, no. 03 (2025): 1–9. https://doi.org/10.55041/ijsrem42761.
Full textHitesh T Loriya. "Quantum Resistant Cryptosystem-Based Security Protocol for 5G Network." Communications on Applied Nonlinear Analysis 31, no. 7s (2024): 696–705. http://dx.doi.org/10.52783/cana.v31.1589.
Full textCardoso-Isidoro, C., and F. Delgado. "Quantum Authentication Using Double Teleportation." Journal of Physics: Conference Series 2448, no. 1 (2023): 012018. http://dx.doi.org/10.1088/1742-6596/2448/1/012018.
Full text., Megha Goel. "AUTHENTICATION FRAMEWORK USING VISUAL CRYPTOGRAPHY." International Journal of Research in Engineering and Technology 02, no. 11 (2013): 271–74. http://dx.doi.org/10.15623/ijret.2013.0211041.
Full textChoubisa, Mukesh, and Brijesh Jajal. "Lightweight ECC and Token-Based Authentication Mechanism for IoT." International Journal of Scientific Research in Computer Science and Engineering 13, no. 1 (2025): 32–37. https://doi.org/10.26438/ijsrcse.v13i1.611.
Full textSingh, Sukhveer. "Investigation of Cryptography for Secure Communication and Data Privacy Applications." Mathematical Statistician and Engineering Applications 70, no. 1 (2021): 551–60. http://dx.doi.org/10.17762/msea.v70i1.2508.
Full textDr., Harshala B. Pethe*1 Varsha C. Pande2 &. Dr. Subhash R. Pande3. "PERFORMANCE ANALYSIS OF AES AND BLOWFISH CRYPTOGRAPHIC ALGORITHMS." GLOBAL JOURNAL OF ENGINEERING SCIENCE AND RESEARCHES [NC-Rase 18] (November 12, 2018): 50–56. https://doi.org/10.5281/zenodo.1483995.
Full textSingh, Ranjeet Kumar. "A Hybrid Approach of Cryptography." International Journal of Social Ecology and Sustainable Development 14, no. 1 (2023): 1–19. http://dx.doi.org/10.4018/ijsesd.326758.
Full textShi, Leyi, and Mengting Liu. "A Decentralized Signcryption Scheme Based on CFL." Sensors 25, no. 6 (2025): 1773. https://doi.org/10.3390/s25061773.
Full textRusetskaya, Irina A. "CRYPTOGRAPHY. FROM THE PAST TO THE FUTURE." RSUH/RGGU Bulletin. Series Information Science. Information Security. Mathematics, no. 4 (2021): 47–57. http://dx.doi.org/10.28995/2686-679x-2021-4-47-57.
Full textVenu, S. V. V. D., Didde Keerthika, Mavuri Rajasri, and Vanapalli Bhavani. "Enhancing Online Security Using Visual Cryptography: A Comprehensive Approach." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 09, no. 04 (2025): 1–9. https://doi.org/10.55041/ijsrem43553.
Full textGopal, S. V. V. D. Venu, Didde Keerthika, Mavuri Rajasri, Vanapalli Bhavani, and Chinnala SatyaUma. "Enhancing Online Security Using Visual Cryptography: A Comprehensive Approach." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 09, no. 04 (2025): 1–9. https://doi.org/10.55041/ijsrem43560.
Full textSantoso, Yogi Suryo. "Message Security Using a Combination of Hill Cipher and RSA Algorithms." Jurnal Matematika Dan Ilmu Pengetahuan Alam LLDikti Wilayah 1 (JUMPA) 1, no. 1 (2021): 20–28. http://dx.doi.org/10.54076/jumpa.v1i1.38.
Full textSripathi Venkata Naga, Santhosh Kumar, Rajkumar Yesuraj, Selvi Munuswamy, and Kannan Arputharaj. "A Comprehensive Survey on Certificate-Less Authentication Schemes for Vehicular Ad hoc Networks in Intelligent Transportation Systems." Sensors 23, no. 5 (2023): 2682. http://dx.doi.org/10.3390/s23052682.
Full textJ.Balaraju, Et al. "Inspired Symbol-based Authentication against Dictionary attacks Using ML Algorithm." International Journal on Recent and Innovation Trends in Computing and Communication 11, no. 9 (2023): 2197–200. http://dx.doi.org/10.17762/ijritcc.v11i9.9223.
Full textYang, Chengjun, Jiansheng Peng, Yong Xu, Qingjin Wei, Ling Zhou, and Yuna Tang. "Edge Computing-Based VANETs’ Anonymous Message Authentication." Symmetry 14, no. 12 (2022): 2662. http://dx.doi.org/10.3390/sym14122662.
Full textKumar, Dilip, and Manoj Kumar. "Hybrid Cryptographic Approach for Data Security Using Elliptic Curve Cryptography for IoT." International Journal of Computer Network and Information Security 16, no. 2 (2024): 42–54. http://dx.doi.org/10.5815/ijcnis.2024.02.04.
Full textYang, Huiwei. "Application of Hybrid Encryption Algorithm in Hardware Encryption Interface Card." Security and Communication Networks 2022 (May 30, 2022): 1–11. http://dx.doi.org/10.1155/2022/7794209.
Full text