Skip to Content
You are currently on the new version of our website. Access the old version .

6 Results Found

  • Review
  • Open Access
18 Citations
5,711 Views
18 Pages

27 July 2022

Cryptography is the study and practice of secure communication with digital data and focuses on confidentiality, integrity, and authentication. Random number generators (RNGs) generate random numbers to enhance security. Even though the cryptographic...

  • Article
  • Open Access
34 Citations
11,380 Views
12 Pages

The LoRaWAN is one of the new low-power wide-area network (LPWAN) standards applied to Internet of Things (IoT) technology. The key features of LPWAN are its low power consumption and long-range coverage. The LoRaWAN 1.1 specification includes a basi...

  • Article
  • Open Access
1,503 Views
23 Pages

23 December 2024

Cloud computing has revolutionized the digital era by providing a more efficient, scalable, and cost-effective infrastructure. Secure systems that encrypt and protect data before it is transmitted over a network and stored in the cloud benefit the en...

  • Editorial
  • Open Access
8 Citations
3,129 Views
4 Pages

22 June 2020

Nowadays, data security is becoming an emerging and challenging issue due to the growth in web-connected devices and significant data generation from information and communication technology (ICT) platforms. Many existing types of research from indus...

  • Review
  • Open Access
116 Citations
24,903 Views
21 Pages

5 February 2021

The latest quantum computers have the ability to solve incredibly complex classical cryptography equations particularly to decode the secret encrypted keys and making the network vulnerable to hacking. They can solve complex mathematical problems alm...

  • Article
  • Open Access
877 Views
30 Pages

Secure Data Transmission Using GS3 in an Armed Surveillance System

  • Francisco Alcaraz-Velasco,
  • José M. Palomares,
  • Fernando León-García and
  • Joaquín Olivares

23 June 2025

Nowadays, the evolution and growth of machine learning (ML) algorithms and the Internet of Things (IoT) are enabling new applications. Smart weapons and people detection systems are examples. Firstly, this work takes advantage of an efficient, scalab...