• Biometry, the safe key 

      Fraile Hurtado, María; Herrero Langreo, Miguel; Menéndez de Miguel, Pilar; Delgado Villanueva, Valerio (International Journal of Interactive Multimedia and Artificial Intelligence (IJIMAI), 12/2010)
      Biometry is the next step in authentication, why do not we take this stepforward in our communication security systems? Keys are the main disadvantage in the cryptography, what if we were our own key?
    • Genetic Operators Applied to Symmetric Cryptography 

      Rodríguez, Jefferson; Corredor, Brayan; Suárez, César (International Journal of Interactive Multimedia and Artificial Intelligence (IJIMAI), 12/2019)
      In this article, a symmetric-key cryptographic algorithm for text is proposed, which applies Genetic Algorithms philosophy, entropy and modular arithmetic. An experimental methodology is used over a deterministic system, ...
    • TD2SecIoT: Temporal, Data-Driven and Dynamic Network Layer Based Security Architecture for Industrial IoT 

      Dejene, Dawit; Tiwari, Basant; Tiwari, Vivek (International Journal of Interactive Multimedia and Artificial Intelligence (IJIMAI), 12/2020)
      The Internet of Things (IoT) is an emerging technology, which comprises wireless smart sensors and actuators. Nowadays, IoT is implemented in different areas such as Smart Homes, Smart Cities, Smart Industries, Military, ...
    • User Revocation-Enabled Access Control Model Using Identity-Based Signature in the Cloud Computing Environment 

      Kumar, Tarun; Kumar, Prabhat; Namasudra, Suyel (International Journal of Interactive Multimedia and Artificial Intelligence (IJIMAI), 05/2024)
      Nowadays, a lot of data is stored in the cloud for sharing purposes across various domains. The increasing number of security issues with cloud data raises confidentiality concerns about keeping these stored or shared data. ...