Octopus++: an enhanced mutual authentication protocol with lightweight encryption and decryption algorithm based on dna in fog computing
The Internet of Things (IoT) envisions a world wherein everyday objects may connect to the internet and exchange data, analyse, store, and gather data from their environment and efficiently mediate on it. Fog computing, closer to the IoT, is formulated in data processing, filtering, aggregating, and...
| Main Author: | Rahman, Gohar |
|---|---|
| Format: | Thesis |
| Language: | English English English |
| Published: |
2023
|
| Subjects: | |
| Online Access: | http://eprints.uthm.edu.my/11038/ |
| Abstract | Abstract here |
Similar Items
Octopus++: an enhanced mutual authentication security protocol and lightweight encryption and decryption algorithm based on DNA in fog computing
by: Rahman, Gohar
Published: (2023)
by: Rahman, Gohar
Published: (2023)
Encryption & decryption using Deffie-Hellman algorithm
by: Hamada, Abdul Rahman Issa
Published: (2025)
by: Hamada, Abdul Rahman Issa
Published: (2025)
Security Study and Encryption / Decryption Method
by: Al-Qdah, Majdi Taysir
Published: (2000)
by: Al-Qdah, Majdi Taysir
Published: (2000)
Implementation and Evaluation of Large Rsa Encryption and Decryption Keys For Internet Security
by: H. Belgassem, Seddeq
Published: (2004)
by: H. Belgassem, Seddeq
Published: (2004)
Effect of file sizes on encryption and decryption in constrained devices / Nurnadia Sapri
by: Sapri, Nurnadia
Published: (2015)
by: Sapri, Nurnadia
Published: (2015)
An enhanced hyper-angle exploitative searching algorithm for fog computing closed loop
by: Taj Aldeen Naser Abdali (P94546)
Published: (2024)
by: Taj Aldeen Naser Abdali (P94546)
Published: (2024)
Low-cost mutual authentication protocol for EPCGlobal Class-1 Generation-2 standard
by: Azzam Zavvari (P53612)
Published: (2023)
by: Azzam Zavvari (P53612)
Published: (2023)
Low-cost mutual authentication protocol for EPCGlobal Class-1 Generation-2 standard
by: Azam Zavvari (P53612)
Published: (2023)
by: Azam Zavvari (P53612)
Published: (2023)
AES encryption of resource allocation for ultra-reliable and enhanced mobile broadband IoT applications in fog network
by: Ahmed Alqourabah, Eissa Abdulsalam
Published: (2022)
by: Ahmed Alqourabah, Eissa Abdulsalam
Published: (2022)
Design and implementation of lightweight encryption algorithm using prince cipher
by: Lee, Jiah Chun
Published: (2025)
by: Lee, Jiah Chun
Published: (2025)
Mutual Authentication Protocol Model For Low-Cost RFID Systems Based On Shelled Random Value
by: al-Dala'ien, Mu'awya Naser Salam
Published: (2011)
by: al-Dala'ien, Mu'awya Naser Salam
Published: (2011)
ECG encryption enhancement with multi-layers of AES and DNA computing
by: Kh-Madhloom, Jamal
Published: (2023)
by: Kh-Madhloom, Jamal
Published: (2023)
Multi-objective algorithms for effective resource management in Edge-Fog-Cloud computing
by: Saif, Faten Ameen Mohammed
Published: (2023)
by: Saif, Faten Ameen Mohammed
Published: (2023)
Enhancing the security of RCIA ultra-lightweight
authentication protocol by using random number generator (RNG) technique
by: Yasear, Shaymah Akram
Published: (2015)
by: Yasear, Shaymah Akram
Published: (2015)
Lightweight ECC Based Multifactor Authentication Protocol (LEMAP) for Device to Device Cellular Network
by: Rashad Mahmood, Saqib, et al.
Published: (2022)
by: Rashad Mahmood, Saqib, et al.
Published: (2022)
Multi-agent fog computing resource management model for critical healthcare applications
by: Mutlag, Ammar Awad
Published: (2023)
by: Mutlag, Ammar Awad
Published: (2023)
Improved TLS protocol for platform integrity assurance using mutual attestation
by: Abd Aziz, Norazah
Published: (2014)
by: Abd Aziz, Norazah
Published: (2014)
Multi-objective optimization for integrated task scheduling and load balancing in fog computing for IoT applications
by: Rafique, Majid
Published: (2025)
by: Rafique, Majid
Published: (2025)
Multi-route plan for reliable services in fog computing-based health care monitoring systems
by: Zeghib, Nour E Imanel
Published: (2024)
by: Zeghib, Nour E Imanel
Published: (2024)
Enhancement of Nth degree truncated polynomial ring for improving decryption failure
by: Juliet Nyokabi Gaithuru
Published: (2025)
by: Juliet Nyokabi Gaithuru
Published: (2025)
Enhancement of Security Architecture for Smartcard Based Authentication Protocols
by: Mohammed, Lawan Ahmed
Published: (2004)
by: Mohammed, Lawan Ahmed
Published: (2004)
Enhancement of lightweight block cipher algorithms
by: Al-Dabbagh, Sufyan Salim Mahmood
Published: (2024)
by: Al-Dabbagh, Sufyan Salim Mahmood
Published: (2024)
Continuous availability of application services via middleware for fog computing environment / Mohd Hariz Naim @ Mohayat
by: Naim @ Mohayat, Mohd Hariz
Published: (2023)
by: Naim @ Mohayat, Mohd Hariz
Published: (2023)
A lightweight and private mobile payment protocol
by: Tan, Soo Fun
Published: (2009)
by: Tan, Soo Fun
Published: (2009)
Implementation of advanced encryption standard in the transport layer security protocol
by: Abrar bin Yousuf
Published: (2024)
by: Abrar bin Yousuf
Published: (2024)
Enhanced password-based authentication protocol / Lee Chee Kiam.
by: Lee, Chee Kiam
Published: (2000)
by: Lee, Chee Kiam
Published: (2000)
Security and performance enhancement of authentication protocols in heterogeneous wireless networks
by: Alezabi, Kamal Ali Ahmed
Published: (2017)
by: Alezabi, Kamal Ali Ahmed
Published: (2017)
Dynamic Task Offloading Algorithm for optimising IoT network quality of service in the Mobile-Fog-Cloud System
by: Nwogbaga, Nweso Emmanuel
Published: (2023)
by: Nwogbaga, Nweso Emmanuel
Published: (2023)
Cloud computing three-factor user authentication framework and protocols for telecare medical information system
by: Zeeshan Siddiqui
Published: (2025)
by: Zeeshan Siddiqui
Published: (2025)
An enhanced color image encryption algorithm using LT-PRNG
by: Mohammed Ismael, Saba
Published: (2018)
by: Mohammed Ismael, Saba
Published: (2018)
IoT data encryption algorithm for security
by: Kanaan Ismael, Marwan
Published: (2020)
by: Kanaan Ismael, Marwan
Published: (2020)
Data Integrity For Cloud Computing With Homomorphic Encryption
by: Awadallah, Ruba N S
Published: (2022)
by: Awadallah, Ruba N S
Published: (2022)
An Approach To Enhance Image Encryption Using Block-Based Trasformation Algorithm.
by: Younes, Mohammad Ali Moh'd Bani
Published: (2009)
by: Younes, Mohammad Ali Moh'd Bani
Published: (2009)
The hybrid cubes encryption algorithm (HiSea)
by: Jamel, Sapi’ee
Published: (2012)
by: Jamel, Sapi’ee
Published: (2012)
Mutual termination agreement
by: Roqiyah Nur Mohd. Sharifuddin
Published: (2025)
by: Roqiyah Nur Mohd. Sharifuddin
Published: (2025)
A new quantum authentication and key distribution protocol
by: Abdul Majeed, Mohammed Munther
Published: (2024)
by: Abdul Majeed, Mohammed Munther
Published: (2024)
Optimization of fat, oil, and grease (FOG) biodegradation using consortium of bacteria
by: Hamdaqa, Nevin F. M.
Published: (2024)
by: Hamdaqa, Nevin F. M.
Published: (2024)
Enhancement of bluetooth security authentication using Hash-Based Message Authentication Code (HMAC) algorithm
by: Saliou, Diallo Alhassane
Published: (2024)
by: Saliou, Diallo Alhassane
Published: (2024)
Modified Data Encryption Standard Algorithm for Textbased Applications
by: Mohamed Khmag, Asem Ib.
Published: (2006)
by: Mohamed Khmag, Asem Ib.
Published: (2006)
Hybrid encryption algorithm based on symmetric and asymmetric ciphers
by: Noor Amira Zuraini Mohd Zulkimi
Published: (2025)
by: Noor Amira Zuraini Mohd Zulkimi
Published: (2025)
Similar Items
-
Octopus++: an enhanced mutual authentication security protocol and lightweight encryption and decryption algorithm based on DNA in fog computing
by: Rahman, Gohar
Published: (2023) -
Encryption & decryption using Deffie-Hellman algorithm
by: Hamada, Abdul Rahman Issa
Published: (2025) -
Security Study and Encryption / Decryption Method
by: Al-Qdah, Majdi Taysir
Published: (2000) -
Implementation and Evaluation of Large Rsa Encryption and Decryption Keys For Internet Security
by: H. Belgassem, Seddeq
Published: (2004) -
Effect of file sizes on encryption and decryption in constrained devices / Nurnadia Sapri
by: Sapri, Nurnadia
Published: (2015)
