Опубликована: Авг. 2, 2024
Язык: Английский
Опубликована: Авг. 2, 2024
Язык: Английский
International Journal of Information Technology, Год журнала: 2024, Номер unknown
Опубликована: Март 6, 2024
Язык: Английский
Процитировано
82021 International Conference on Data Analytics for Business and Industry (ICDABI), Год журнала: 2022, Номер unknown
Опубликована: Окт. 25, 2022
As an emerging technology, Blockchain technology can efficiently be used for various tasks in domains. It has become disruptive due to its secure, immutable, decentralized, persistent, anonymous, and auditable nature. a lot of opportunities offer fields like cryptocurrency, risk management, supply-chain financial services, identity healthcare, cloud computing, the Internet things (IoT). is relatively young proliferating; thus, several challenges must addressed realize full potential. These are even more significant require critical attention because aspect blockchain-based solutions. This work attempts present holistic picture Technology by discussing overview, style, reality, actuality Blockchain. discusses components, including mining consensus mechanisms. also presents layers, multiple applications, advantages, disadvantages. study issues which helpful researchers explore advance aspects Technology.
Язык: Английский
Процитировано
23International Journal of Information Technology, Год журнала: 2023, Номер 16(3), С. 1733 - 1741
Опубликована: Окт. 3, 2023
Язык: Английский
Процитировано
11Security and Privacy, Год журнала: 2024, Номер unknown
Опубликована: Сен. 26, 2024
ABSTRACT S‐box strengthens the encryption and decryption process by introducing nonlinearity protecting encrypted data against various differential linear cryptanalytic attacks. Generating a highly nonlinear with maximal is computationally impractical due to expansive search space, classifying it as an NP‐hard problem. This paper proposes Hawkboost algorithm, novel hybrid method merging Harris Hawks optimization algorithm (HHO) Booster for generating S‐boxes low computational efforts. The HHO utilized navigate in large permutation space find acceptable cryptographic properties. assisted Transfer function Random Key (RK) speed up design process. Additionally, enhances applying random local operators like swap inversion, effectively reshaping elements of S‐box. combination methodologies facilitates efficient generation that exhibit excellent properties while addressing key challenges optimization. performance proposed has been analyzed comparing state‐of‐the‐art based on numerous characteristics including average nonlinearity, strict Avalanche criterion (SAC), SAC offset, bit independence (BIC), approximation probability (LP), (DP), fixed points, opposite cycle counts. results from experiments analysis multiple metrics show satisfies all requirements safe reliable without sacrificing any crucial security features.
Язык: Английский
Процитировано
4SN Computer Science, Год журнала: 2025, Номер 6(2)
Опубликована: Янв. 22, 2025
Язык: Английский
Процитировано
0The Journal of Supercomputing, Год журнала: 2024, Номер 80(11), С. 15834 - 15867
Опубликована: Апрель 6, 2024
Язык: Английский
Процитировано
3International Journal of Information Technology, Год журнала: 2024, Номер 16(6), С. 3691 - 3701
Опубликована: Июнь 22, 2024
Язык: Английский
Процитировано
3Arabian Journal for Science and Engineering, Год журнала: 2025, Номер unknown
Опубликована: Фев. 6, 2025
Язык: Английский
Процитировано
0International Journal of Information Technology, Год журнала: 2025, Номер unknown
Опубликована: Фев. 24, 2025
Язык: Английский
Процитировано
0Опубликована: Янв. 28, 2024
The amalgamation of Cloud Computing and Internet-of-Things (IoT), i.e., Cloud-of-Things (CoT), has emerged as one the indispensable technologies in IT business world. success CoT depends on efficient services provided by cloud computing to requests generated IoT devices. management virtualized resources, an NP-hard problem, is major component developing trust reliability among users. This research proposes a novel chaotic transfer functionassisted modified grey wolf optimizer (MGWO) algorithm schedule virtual machines computing. proposed MGWO utilizes function convert into solution circle map improve initial population's diversity, which leads faster convergence better exploitation exploration. algorithm's performance superior generic version GWO its variants.
Язык: Английский
Процитировано
2