Artificial intelligence in healthcare: A double-edged sword DOI Creative Commons
Mallanagouda Patil

BLDE University Journal of Health Sciences, Journal Year: 2024, Volume and Issue: 9(2), P. 95 - 96

Published: July 1, 2024

Language: Английский

Next Gen Security With Quantum-Safe Cryptography DOI

N.P. Singh,

Sunil K. Singh, Sudhakar Kumar

et al.

Advances in information security, privacy, and ethics book series, Journal Year: 2024, Volume and Issue: unknown, P. 131 - 164

Published: July 12, 2024

With the rise and development of quantum computing, there is a high scope in encryption methods increasing security integrity data manyfolds. To safeguard user's data, safe cryptography needs to be implemented different aspects transmission data. This study takes algorithms into account that are being used for discusses how they can current industries systems. chapter examines algorithms—lattice-based, hash-based, code-based—assessing their pros cons against threats. It explores impact on finance, healthcare, government, implementation challenges such as performance compatibility. The need global standardization collaboration widespread adoption also explored.

Language: Английский

Citations

9

Zero Knowledge Proofs and Their Applications in Cryptography DOI

Tanish Aggarwal,

Sudhakar Kumar, Sunil K. Singh

et al.

Advances in information security, privacy, and ethics book series, Journal Year: 2024, Volume and Issue: unknown, P. 55 - 74

Published: July 12, 2024

Zero Knowledge Proofs (ZKPs), cryptographic protocols that allow a party to authenticate transaction another without disclosing additional information beyond the authenticity of transaction, continue have significant impact on privacy, security, and integrity in applications. It addresses constraints such as computing costs, trust dimensions, integration complexity, proposes possible methods techniques for future research. emphasizes importance ZKP improving privacy security digital systems highlights, article continuous innovation further development their standardization efforts. (ZKPs) emerged powerful tool cryptography, offering innovative solutions authentication challenges. This provides an in-depth review ZKPs, exploring progress, challenges prospects cryptography. examines basic concepts applications, protocols.

Language: Английский

Citations

7

Homomorphic Encryption in Smart City Applications for Balancing Privacy and Utility DOI
Sudhakar Kumar, Sunil K. Singh, Brij B. Gupta

et al.

Advances in information security, privacy, and ethics book series, Journal Year: 2024, Volume and Issue: unknown, P. 241 - 269

Published: July 12, 2024

Homomorphic encryption is like a secret code that allows us to do calculations on private information without actually seeing the details. This super important for keeping things while still getting useful insights. chapter discusses how homomorphic can be implemented into smart city infrastructure. Furthermore, research investigates potential of and blockchain technology integration make cities even more secure. explores impact privacy in cities. It examines legal technological factors at play, considering regulations both help hinder use this technology. Ultimately, it argues key balancing utility, essential success initiatives.

Language: Английский

Citations

4

Applying Visual Cryptography to Decrypt Data Using Human Senses DOI

Dikshant Rajput,

Sunil K. Singh, Sudhakar Kumar

et al.

Advances in information security, privacy, and ethics book series, Journal Year: 2024, Volume and Issue: unknown, P. 376 - 404

Published: July 12, 2024

In the era of cryptographic advancement, integrating human workflow with technology is a natural progression. Traditionally, advancements have focused on mathematical robustness and computational security. This research delves into combining methods to explore foundations visual cryptography its practical implementation in decrypting sensitive information. Challenges related usability, such as complex concepts, key management, user authentication, cross-platform compatibility, social engineering attacks, balancing privacy functionality, are evaluated proposed solutions across various domains. Additionally, study suggests enhance accessibility tools, including iterative design processes, research, user-friendly interfaces, error handling. Visual cryptography, leveraging capabilities system, presents unique approach data decryption that circumvents traditional reliance algorithms.

Language: Английский

Citations

4

Advanced Tools and Technologies for Phishing Prevention DOI

Kamaljit Kaur,

Sunil K. Singh, Sudhakar Kumar

et al.

IGI Global eBooks, Journal Year: 2025, Volume and Issue: unknown, P. 187 - 212

Published: Feb. 14, 2025

Phishing attacks are a major cybersecurity threat, exploiting human vulnerabilities by manipulating trust to access sensitive information. As phishing tactics evolve, the demand for advanced anti-phishing technologies has surged. This paper examines key measures such as email filters, SSL/TLS certificates, DNS-based authentication, multi-factor and URL filtering protect against phishing. Advanced methods like machine learning, AI-driven analysis, real-time threat detection have improved prevention. It also discusses browser-based, cloud-based, security tools mitigating risks. The highlights challenges evolving tactics, limitations, user negligence, emphasizing need ongoing innovation in strategies. Future trends AI, biometrics, deep learning intelligence explored, showing potential enhance defense. A holistic approach integrating technology, protocols, awareness is advocated combat effectively at both individual organizational levels.

Language: Английский

Citations

0

The Influence of AI on Social Interactions and Community Dynamics DOI

Jasjeet Singh,

Sunil K. Singh, Sudhakar Kumar

et al.

IGI Global eBooks, Journal Year: 2025, Volume and Issue: unknown, P. 197 - 220

Published: Feb. 28, 2025

The rapid advancement of Artificial Intelligence (AI) has transformed social interaction, reshaping communication, relationship-building, and community engagement. This chapter examines AI's multifaceted impact on human dynamics, highlighting both the benefits challenges posed by AI technologies in modern communication tools, media, online platforms. While AI-driven algorithms automated responses personalize interactions, they also raise concerns about authenticity emotional connection, making relationships paradoxically impersonal. explores how enhances efficiency through real-time translation AI-assisted moderation, while addressing ethical dilemmas related to echo chambers, behavior influence, algorithmic bias. By providing a balanced perspective role contexts, advocates for responsible development emphasizes need maintain standards safeguard human-centered values an world.

Language: Английский

Citations

0

Understanding Cyber Threats in Modern Space Missions DOI

Anoop Pant,

Sudhakar Kumar, Sunil K. Singh

et al.

IGI Global eBooks, Journal Year: 2025, Volume and Issue: unknown, P. 29 - 60

Published: Feb. 28, 2025

The integration of blockchain technology with cryptocurrency has significantly improved security, transparency, and decentralization in digital finance. authors explore the fundamental principles its integral role development operation various cryptocurrencies. They present a comprehensive analysis blockchain's core architecture, including consensus mechanisms such as proof work (PoW) stake (PoS), examine their implications for transaction security efficiency. Through detailed case studies industry examples, study illustrates how addresses issues like double-spending fraud, thereby maintaining trust reliability financial systems. Furthermore, chapter discusses regulatory scalability challenges associated offers insights into future trends advancements. By addressing technical practical aspects technology, highlights it empowers cryptocurrency.

Language: Английский

Citations

0

Advanced Techniques and Best Practices for Phishing Detection DOI
R. Mittal, Sunil K. Singh, Sudhakar Kumar

et al.

IGI Global eBooks, Journal Year: 2025, Volume and Issue: unknown, P. 149 - 186

Published: Feb. 14, 2025

Phishing attacks are among the most prevalent and dangerous cyber threats, exploiting both technological human vulnerabilities to access sensitive information. As phishing techniques evolve, organizations must implement various detection strategies stay ahead of cybercriminals. This chapter delves into methods, covering traditional approaches like signature-based content filtering, alongside advanced such as heuristic analysis, machine learning, artificial intelligence (AI). It evaluates strengths, limitations, practical applications these methods in real-world scenarios. Additionally, explores emerging technologies Natural Language Processing (NLP), blockchain, behavioral analysis that redefining detection. By combining modern techniques, can enhance their ability identify prevent attacks, strengthening overall cybersecurity.

Language: Английский

Citations

0

Phishing Prevention Solutions and Mechanisms DOI

Abhavya Muku,

Sunil K. Singh, Sudhakar Kumar

et al.

IGI Global eBooks, Journal Year: 2025, Volume and Issue: unknown, P. 49 - 72

Published: Feb. 14, 2025

Phishing is a dangerous online fraud tactic that tricks individuals into disclosing personal information, like usernames, passwords, and credit card numbers. It often appears through fake emails, messages, or websites designed to lure victims sharing sensitive data. This illegal activity can cause significant financial losses for businesses consumers, while also damaging trust in transactions. Anti-phishing tools, such as SpamTitan Barracuda Sentinel, use advanced algorithms machine learning detect block phishing attempts real time, protecting users from data breaches harm. These solutions offer user training increase awareness of tactics, enhancing defenses. Emphasizing the need comprehensive anti-phishing strategies, it shows how organizations safeguard information maintain customer digital world. explores technologies methods building robust framework against phishing, detailing innovative ways secure communication systems ensure integrity.

Language: Английский

Citations

0

Foundations of Phishing Defense DOI

Kanwar Raj,

S.S. Bawa,

Sunil K. Singh

et al.

IGI Global eBooks, Journal Year: 2025, Volume and Issue: unknown, P. 1 - 24

Published: Feb. 14, 2025

Phishing remains a significant cybersecurity threat, targeting individuals and organizations to access confidential data. As techniques evolve, innovative protective measures are essential. This paper offers detailed overview of phishing defense strategies, focusing on both technological solutions human-centered approaches. Multi-layered defenses, blending traditional security with user education, vital for mitigating risks. Simulated exercises ongoing training empower employees recognize respond threats, strengthening the human aspect cybersecurity. Leadership commitment open communication crucial cultivating strong culture, encouraging staff report suspicious activities. Continuous evaluation updates defenses necessary adapt evolving threats. Real-world case studies, such as 2020 Twitter breach SolarWinds attack, highlight severe impacts phishing, reinforcing need proactive that combines technology, risk management protect digital assets effectively.

Language: Английский

Citations

0