Published: Aug. 2, 2024
Language: Английский
Published: Aug. 2, 2024
Language: Английский
International Journal of Information Technology, Journal Year: 2024, Volume and Issue: unknown
Published: March 6, 2024
Language: Английский
Citations
82021 International Conference on Data Analytics for Business and Industry (ICDABI), Journal Year: 2022, Volume and Issue: unknown
Published: Oct. 25, 2022
As an emerging technology, Blockchain technology can efficiently be used for various tasks in domains. It has become disruptive due to its secure, immutable, decentralized, persistent, anonymous, and auditable nature. a lot of opportunities offer fields like cryptocurrency, risk management, supply-chain financial services, identity healthcare, cloud computing, the Internet things (IoT). is relatively young proliferating; thus, several challenges must addressed realize full potential. These are even more significant require critical attention because aspect blockchain-based solutions. This work attempts present holistic picture Technology by discussing overview, style, reality, actuality Blockchain. discusses components, including mining consensus mechanisms. also presents layers, multiple applications, advantages, disadvantages. study issues which helpful researchers explore advance aspects Technology.
Language: Английский
Citations
23International Journal of Information Technology, Journal Year: 2023, Volume and Issue: 16(3), P. 1733 - 1741
Published: Oct. 3, 2023
Language: Английский
Citations
11SN Computer Science, Journal Year: 2025, Volume and Issue: 6(2)
Published: Jan. 22, 2025
Language: Английский
Citations
0International Journal of Information Technology, Journal Year: 2024, Volume and Issue: 16(6), P. 3691 - 3701
Published: June 22, 2024
Language: Английский
Citations
3Security and Privacy, Journal Year: 2024, Volume and Issue: unknown
Published: Sept. 26, 2024
ABSTRACT S‐box strengthens the encryption and decryption process by introducing nonlinearity protecting encrypted data against various differential linear cryptanalytic attacks. Generating a highly nonlinear with maximal is computationally impractical due to expansive search space, classifying it as an NP‐hard problem. This paper proposes Hawkboost algorithm, novel hybrid method merging Harris Hawks optimization algorithm (HHO) Booster for generating S‐boxes low computational efforts. The HHO utilized navigate in large permutation space find acceptable cryptographic properties. assisted Transfer function Random Key (RK) speed up design process. Additionally, enhances applying random local operators like swap inversion, effectively reshaping elements of S‐box. combination methodologies facilitates efficient generation that exhibit excellent properties while addressing key challenges optimization. performance proposed has been analyzed comparing state‐of‐the‐art based on numerous characteristics including average nonlinearity, strict Avalanche criterion (SAC), SAC offset, bit independence (BIC), approximation probability (LP), (DP), fixed points, opposite cycle counts. results from experiments analysis multiple metrics show satisfies all requirements safe reliable without sacrificing any crucial security features.
Language: Английский
Citations
3Arabian Journal for Science and Engineering, Journal Year: 2025, Volume and Issue: unknown
Published: Feb. 6, 2025
Language: Английский
Citations
0International Journal of Information Technology, Journal Year: 2025, Volume and Issue: unknown
Published: Feb. 24, 2025
Language: Английский
Citations
0The Journal of Supercomputing, Journal Year: 2024, Volume and Issue: 80(11), P. 15834 - 15867
Published: April 6, 2024
Language: Английский
Citations
3Published: Jan. 28, 2024
The amalgamation of Cloud Computing and Internet-of-Things (IoT), i.e., Cloud-of-Things (CoT), has emerged as one the indispensable technologies in IT business world. success CoT depends on efficient services provided by cloud computing to requests generated IoT devices. management virtualized resources, an NP-hard problem, is major component developing trust reliability among users. This research proposes a novel chaotic transfer functionassisted modified grey wolf optimizer (MGWO) algorithm schedule virtual machines computing. proposed MGWO utilizes function convert into solution circle map improve initial population's diversity, which leads faster convergence better exploitation exploration. algorithm's performance superior generic version GWO its variants.
Language: Английский
Citations
2