Octopus++: an enhanced mutual authentication security protocol and lightweight encryption and decryption algorithm based on DNA in fog computing
The Internet of Things (IoT) envisions a world wherein everyday objects may connect to the internet and exchange data, analyse, store, and gather data from their environment and efficiently mediate on it. Fog computing, closer to the IoT, is formulated in data processing, filtering, aggregating, and...
| Main Author: | Rahman, Gohar |
|---|---|
| Format: | Thesis |
| Language: | English English English |
| Published: |
2023
|
| Subjects: | |
| Online Access: | http://eprints.uthm.edu.my/10836/ |
| Abstract | Abstract here |
Similar Items
Octopus++: an enhanced mutual authentication protocol with lightweight encryption and decryption algorithm based on dna in fog computing
by: Rahman, Gohar
Published: (2023)
by: Rahman, Gohar
Published: (2023)
Security Study and Encryption / Decryption Method
by: Al-Qdah, Majdi Taysir
Published: (2000)
by: Al-Qdah, Majdi Taysir
Published: (2000)
Encryption & decryption using Deffie-Hellman algorithm
by: Hamada, Abdul Rahman Issa
Published: (2025)
by: Hamada, Abdul Rahman Issa
Published: (2025)
Implementation and Evaluation of Large Rsa Encryption and Decryption Keys For Internet Security
by: H. Belgassem, Seddeq
Published: (2004)
by: H. Belgassem, Seddeq
Published: (2004)
Encryption and decryption for JPEG - Lossless, targa & bitmap image file format using blowfish & SEF algorithm
by: Then, Siaw Cheik
Published: (2025)
by: Then, Siaw Cheik
Published: (2025)
Effect of file sizes on encryption and decryption in constrained devices / Nurnadia Sapri
by: Sapri, Nurnadia
Published: (2015)
by: Sapri, Nurnadia
Published: (2015)
Low-cost mutual authentication protocol for EPCGlobal Class-1 Generation-2 standard
by: Azzam Zavvari (P53612)
Published: (2023)
by: Azzam Zavvari (P53612)
Published: (2023)
Low-cost mutual authentication protocol for EPCGlobal Class-1 Generation-2 standard
by: Azam Zavvari (P53612)
Published: (2023)
by: Azam Zavvari (P53612)
Published: (2023)
Enhancing the security of RCIA ultra-lightweight
authentication protocol by using random number generator (RNG) technique
by: Yasear, Shaymah Akram
Published: (2015)
by: Yasear, Shaymah Akram
Published: (2015)
Mutual Authentication Protocol Model For Low-Cost RFID Systems Based On Shelled Random Value
by: al-Dala'ien, Mu'awya Naser Salam
Published: (2011)
by: al-Dala'ien, Mu'awya Naser Salam
Published: (2011)
The encryption - decryption of the column level for a commercial DBMS with supporting user interface
Published: (2025)
Published: (2025)
The encryption - decryption of the column level for a commercial DBMS with supporting user interface
Published: (2025)
Published: (2025)
Design and implementation of lightweight encryption algorithm using prince cipher
by: Lee, Jiah Chun
Published: (2025)
by: Lee, Jiah Chun
Published: (2025)
An enhanced hyper-angle exploitative searching algorithm for fog computing closed loop
by: Taj Aldeen Naser Abdali (P94546)
Published: (2024)
by: Taj Aldeen Naser Abdali (P94546)
Published: (2024)
Multi-objective algorithms for effective resource management in Edge-Fog-Cloud computing
by: Saif, Faten Ameen Mohammed
Published: (2023)
by: Saif, Faten Ameen Mohammed
Published: (2023)
IoT data encryption algorithm for security
by: Kanaan Ismael, Marwan
Published: (2020)
by: Kanaan Ismael, Marwan
Published: (2020)
Implementation of advanced encryption standard in the transport layer security protocol
by: Abrar bin Yousuf
Published: (2024)
by: Abrar bin Yousuf
Published: (2024)
AES encryption of resource allocation for ultra-reliable and enhanced mobile broadband IoT applications in fog network
by: Ahmed Alqourabah, Eissa Abdulsalam
Published: (2022)
by: Ahmed Alqourabah, Eissa Abdulsalam
Published: (2022)
ECG encryption enhancement with multi-layers of AES and DNA computing
by: Kh-Madhloom, Jamal
Published: (2023)
by: Kh-Madhloom, Jamal
Published: (2023)
Lightweight ECC Based Multifactor Authentication Protocol (LEMAP) for Device to Device Cellular Network
by: Rashad Mahmood, Saqib, et al.
Published: (2022)
by: Rashad Mahmood, Saqib, et al.
Published: (2022)
Enhancement of Security Architecture for Smartcard Based Authentication Protocols
by: Mohammed, Lawan Ahmed
Published: (2004)
by: Mohammed, Lawan Ahmed
Published: (2004)
Security and performance enhancement of authentication protocols in heterogeneous wireless networks
by: Alezabi, Kamal Ali Ahmed
Published: (2017)
by: Alezabi, Kamal Ali Ahmed
Published: (2017)
Trust based Lightweight Security Protocol for Device to Device Multihop Cellular Communication
by: Yasir, Javed
Published: (2020)
by: Yasir, Javed
Published: (2020)
Multi-agent fog computing resource management model for critical healthcare applications
by: Mutlag, Ammar Awad
Published: (2023)
by: Mutlag, Ammar Awad
Published: (2023)
Fast and secured MPEG-2 encryption algorithms using chaotic maps
by: Ali Abdulgader Mohamed Alshanoukie (P44224)
Published: (2023)
by: Ali Abdulgader Mohamed Alshanoukie (P44224)
Published: (2023)
Secured Communication Mechanism For Message Authentication And Data Confidentiality In Secs/Gem Protocol
by: Jaisan S M, Ashish
Published: (2024)
by: Jaisan S M, Ashish
Published: (2024)
A Novel Dynamic Evolutionary Model Integrating Discrete Hopfield Neural Networks With Satisfiability Problems And Its Applications In Image Encryption And Decryption
by: Feng, Caicai
Published: (2025)
by: Feng, Caicai
Published: (2025)
Improved TLS protocol for platform integrity assurance using mutual attestation
by: Abd Aziz, Norazah
Published: (2014)
by: Abd Aziz, Norazah
Published: (2014)
Symmetric encryption using preshared public parameters for a secure TFTP protocol / Nur Nabila Mohamed
by: Mohamed, Nur Nabila
Published: (2015)
by: Mohamed, Nur Nabila
Published: (2015)
A user authentication model for securing trusted computing environment
by: Alshar'e Marwan Ibrahim Ahmad (P50008)
Published: (2023)
by: Alshar'e Marwan Ibrahim Ahmad (P50008)
Published: (2023)
New framework for securing mobile adhoc network using lightweight authentication and signature-based intrusion detection system
by: Satria Mandala
Published: (2025)
by: Satria Mandala
Published: (2025)
Lightweight security mechanism over message queuing telemetry transport (MQTT) protocol for IoT devices
by: Sanaz Amanlou (P95650)
Published: (2023)
by: Sanaz Amanlou (P95650)
Published: (2023)
Enhancement of bluetooth security authentication using Hash-Based Message Authentication Code (HMAC) algorithm
by: Saliou, Diallo Alhassane
Published: (2024)
by: Saliou, Diallo Alhassane
Published: (2024)
Multi-objective optimization for integrated task scheduling and load balancing in fog computing for IoT applications
by: Rafique, Majid
Published: (2025)
by: Rafique, Majid
Published: (2025)
Multi-route plan for reliable services in fog computing-based health care monitoring systems
by: Zeghib, Nour E Imanel
Published: (2024)
by: Zeghib, Nour E Imanel
Published: (2024)
Implementation of a simplified algorithm for secure quantum channel authentication
by: Elwadeya, Mohamed Youssef Khalaf
Published: (2024)
by: Elwadeya, Mohamed Youssef Khalaf
Published: (2024)
Continuous availability of application services via middleware for fog computing environment / Mohd Hariz Naim @ Mohayat
by: Naim @ Mohayat, Mohd Hariz
Published: (2023)
by: Naim @ Mohayat, Mohd Hariz
Published: (2023)
Integrating Identity-Based Encryption (Ibe) In The Return Routability Protocol (Rrp) To Enhance Signals Security
In Mobile Ipv6.
by: S. Alsayfi, Majed Salam
Published: (2010)
by: S. Alsayfi, Majed Salam
Published: (2010)
Impact of MD5 Authentication in Secured and Non-Secured Traffic Routing for the Case of EIGRP, RIPv2 and OSPF Routing Protocols
by: Al-Saud, Khalid Ahmed Abu
Published: (2009)
by: Al-Saud, Khalid Ahmed Abu
Published: (2009)
A lightweight and private mobile payment protocol
by: Tan, Soo Fun
Published: (2009)
by: Tan, Soo Fun
Published: (2009)
Similar Items
-
Octopus++: an enhanced mutual authentication protocol with lightweight encryption and decryption algorithm based on dna in fog computing
by: Rahman, Gohar
Published: (2023) -
Security Study and Encryption / Decryption Method
by: Al-Qdah, Majdi Taysir
Published: (2000) -
Encryption & decryption using Deffie-Hellman algorithm
by: Hamada, Abdul Rahman Issa
Published: (2025) -
Implementation and Evaluation of Large Rsa Encryption and Decryption Keys For Internet Security
by: H. Belgassem, Seddeq
Published: (2004) -
Encryption and decryption for JPEG - Lossless, targa & bitmap image file format using blowfish & SEF algorithm
by: Then, Siaw Cheik
Published: (2025)
