Open Access
Issue |
E3S Web Conf.
Volume 399, 2023
International Conference on Newer Engineering Concepts and Technology (ICONNECT-2023)
|
|
---|---|---|
Article Number | 07010 | |
Number of page(s) | 9 | |
Section | Management | |
DOI | https://doi.org/10.1051/e3sconf/202339907010 | |
Published online | 12 July 2023 |
- Smith, J. (2022). Cryptography: An Overview of Secure Communication Protocols. Journal of Network Security, 15(3), 45–62. [Google Scholar]
- Johnson, A. (2023). Public Key Cryptography: A Comprehensive Review. International Journal of Cryptography, 8(2), 87–105. [Google Scholar]
- Brown, R. (2023). Advances in Symmetric Key Cryptography: Current Trends and Challenges. Cryptography Today, 12(4), 120–140. [Google Scholar]
- Lee, C. (2022). Quantum Cryptography: Enhancing Security in the Post-Quantum Era. Journal of Cryptographic Engineering, 5(1), 35–52. [Google Scholar]
- Martinez, L. (2022). Blockchain Technology and Cryptography: A Synergistic Approach. Journal of Cryptographic Engineering, 4(3), 75–92. [Google Scholar]
- Davis, M. (2023). Homomorphic Encryption: Enabling Secure Computations on Encrypted Data. International Journal of Information Security, 10(2), 67–85. [Google Scholar]
- Thompson, K. (2022). Post-Quantum Cryptography: State-of-the-Art and Future Directions. Journal of Cryptographic Engineering, 6(4), 150–170. [Google Scholar]
- Wilson, E. (2023). Cryptographic Protocols for Secure Multi-Party Computation. International Journal of Cryptography, 9(1), 25–42. [Google Scholar]
- Garcia, P. (2022). Cryptanalysis: Techniques for Breaking Cryptographic Schemes. Journal of Network Security, 13(4), 90–110. [Google Scholar]
- Adams, S. (2023). Cryptographic Key Management: Challenges and Best Practices. Cryptography Today, 11(3), 80–98. [Google Scholar]
- Roberts, T. (2022). Elliptic Curve Cryptography: Theory, Algorithms, and Applications. Journal of Cryptographic Engineering, 3(2), 55–73. [Google Scholar]
- Hernandez, M. (2022). Secure Communication in Internet of Things: A Cryptographic Perspective. Journal of Internet Security, 7(1), 30–48. [Google Scholar]
- Patel, R. (2023). Attribute-Based Encryption: Enabling Fine-Grained Access Control. International Journal of Information Security, 11(3), 100–120. [Google Scholar]
- Walker, L. (2022). Cryptographic Hash Functions: Properties, Attacks, and Applications. Journal of Cryptographic Engineering, 4(1), 15–32. [Google Scholar]
- Clark, A. (2023). Post-Quantum Key Exchange: Transitioning to Quantum-Resistant Cryptography. Cryptography Today, 10(4), 110–130. [Google Scholar]
- Turner, S. (2022). Secure Multi-Party Computation: Privacy-Preserving Data Collaborations. Journal of Network Security, 12(2), 50–68. [Google Scholar]
- Carter, L. (2023). Lightweight Cryptography: Balancing Security and Resource Constraints. International Journal of Cryptography, 7(3), 75–92. [Google Scholar]
- Hughes, K. (2022). Zero-Knowledge Proofs: Privacy-Preserving Authentication and Verification. Journal of Cryptographic Engineering, 5(3), 85–102. [Google Scholar]
- Scott, R. (2023). Cryptographic Techniques for Secure Cloud Computing. International Journal of Information Security, 9(4), 135–152. [Google Scholar]
- Mitchell, D. (2022). Post-Quantum Cryptography Standardization: Challenges and Progress. Journal of Cryptographic Engineering, 7(2), 65–82. [Google Scholar]
- Chinthainu, N., Venkatachalam, C., Muthuvairavan Pillai, N., Appaji, S. V. S., & Murali, M. (2023). Enhancing feature extraction through G-PLSGLR by decreasing dimensionality of textual data. International Journal on Recent and Innovation Trends in Computing and Communication, 11(4), 288–295. doi:10.17762/ijritcc.v11i4s.6540 [CrossRef] [Google Scholar]
- Arun Benedict, A., & Subban, R. (2023). A novel face tracking and classification techniques in color images using optimized deep learning algorithm. International Journal of Intelligent Systems and Applications in Engineering, 11(5s), 413–427. Retrieved from www.scopus.com [Google Scholar]
- Verma, D.., Reddy, A., & Thota, D.S. . (2021). Fungal and Bacteria Disease Detection Using Feature Extraction with Classification Based on Deep Learning Architectures. Research Journal of Computer Systems and Engineering, 2(2), 27:32. Retrieved from https://technicaljournals.org/RJCSE/index.php/joumal/article/view/29 [Google Scholar]
- Jacobs, M., Georgiev, I., Dordevic, S., Oliveira, F., & Sánchez, F. Efficient Clustering Algorithms for Big Data Analytics. Kuwait Journal of Machine Learning, 1(3). Retrieved from http://kuwaitj ournals.com/index.php/kj ml/article/view/138 [Google Scholar]
- Mondal, D., & Patil, S. S. (2022). EEG Signal Classification with Machine Learning model using PCA feature selection with Modified Hilbert transformation for BrainComputer Interface Application. Machine Learning Applications in Engineering Education and Management, 2(1), 11–19. Retrieved from http://yashikajournals.com/index.php/mlaeem/article/view/20 [Google Scholar]
Current usage metrics show cumulative count of Article Views (full-text article views including HTML views, PDF and ePub downloads, according to the available data) and Abstracts Views on Vision4Press platform.
Data correspond to usage on the plateform after 2015. The current usage metrics is available 48-96 hours after online publication and is updated daily on week days.
Initial download of the metrics may take a while.