<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Volume-4 Issue-2, November 2024 &#8211; Indian Journal of Cryptography and Network Security (IJCNS)</title>
	<atom:link href="https://www.ijcns.latticescipub.com/portfolio_entries/volume-4-issue-2-november-2024/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.ijcns.latticescipub.com</link>
	<description>Exploring Innovation &#124; ISSN: 2582-9238 (Online) &#124; A Periodical Journal &#124; Reg. No: C/1383209 &#124; Published by Lattice Science Publication (LSP)</description>
	<lastBuildDate>Fri, 27 Dec 2024 07:19:16 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://www.ijcns.latticescipub.com/wp-content/uploads/2021/04/cropped-IJCNS-logo-WFS-32x32.png</url>
	<title>Volume-4 Issue-2, November 2024 &#8211; Indian Journal of Cryptography and Network Security (IJCNS)</title>
	<link>https://www.ijcns.latticescipub.com</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>B143004021124</title>
		<link>https://www.ijcns.latticescipub.com/portfolio-item/b143004021124/</link>
		
		<dc:creator><![CDATA[IJCNS Journal]]></dc:creator>
		<pubDate>Mon, 23 Dec 2024 12:09:57 +0000</pubDate>
				<guid isPermaLink="false">https://www.ijcns.latticescipub.com/?post_type=portfolio&#038;p=1061</guid>

					<description><![CDATA[<p>The Indian Journal of Cryptography and Network Security (IJCNS) has ISSN 2582-9238 (online), an open-access, peer-reviewed, periodical half-yearly international journal, which is published by Lattice Science Publication (LSP) in May and November. The aim of the journal is to publish high quality peer–reviewed original articles in the area of Cryptography and Network Security that covers Cryptographic Protocols, Cryptography and Coding, Untrace-Ability, Privacy and Authentication, Key Management, Authentication, Trust Management, Quantum Cryptography, Computational Intelligence in Security, Artificial Immune Systems, Biological &amp; Evolutionary, Computation, Intelligent Agents and Systems, Reinforcement &amp; Unsupervised Learning, Autonomy-Oriented Computing, Coevolutionary Algorithms, Fuzzy Systems, Biometric Security, Trust Models and Metrics, Regulation and Trust Mechanisms, Data Integrity, Models for Authentication, Trust and Authorization, Wireless Network Security, Information Hiding, Data &amp; System Integrity, Access Control and Intrusion Detection, Intrusion Detection and Vulnerability Assessment, Authentication and Non-Repudiation, Identification and Authentication Insider Threats and Countermeasures, Intrusion Detection &amp; Prevention, Secure Cloud Computing, Security Information Systems Architecture and Design and Security Patterns, Security Management, Security Requirements (Threats, Vulnerabilities, Risk, Formal Methods, etc.), Sensor and Mobile ad hoc Network Security, Service and Systems Design and QOS Network Security, System Security, Intrusion Detection, Secure end Systems, Secure Operating Systems, Data Base Security, Security Infrastructures, Security Evaluation, Software Security, Security and Privacy in Mobile Systems, Security and Privacy in Pervasive/Ubiquitous Computing, Security and Privacy in Web Services, Security and Privacy Policies, Security Area Control, Security Deployment, Security Engineering, Security for Grid Computing, Security in Distributed Systems, Network Security, Internet Security, Firewalls, Mobile Security, Security Agents, Protocols, Anti-Virus and Anti-Hacker Measures, Content Protection, Software Protection, Tamper Resistant Software, Electronic Commerce, Electronic Government, Health, Telecommunications, Mobility, Foundations, Privacy, Access Control, Identification, Applied Cryptography and Formal Methods in Information Security.#Cryptographic Protocols #Cryptography and Coding #Untrace-Ability #Privacy and Authentication #Key Management #Authentication #Trust Management #Quantum Cryptography #Computational Intelligence in Security #Artificial Immune Systems #Biological &amp; Evolutionary Computation #Intelligent Agents and Systems #Reinforcement &amp; Unsupervised Learning #Autonomy-Oriented Computing #Coevolutionary Algorithms #Fuzzy Systems #Biometric Security #Trust Models and Metrics #Regulation and Trust Mechanisms #Data Integrity #Models for Authentication #Trust and Authorization #Wireless Network Security #Information Hiding #Data &amp; System Integrity #Access Control and Intrusion Detection #Intusion Detection and Vulnerability Assessment #Authentication and Non-Repudiation #Identification and Authentication #Insider Threats and Countermeasures #Intrusion Detection &amp; Prevention #Secure Cloud Computing #Security Information Systems Architecture and Design and Security Patterns #Security Management #Security Requirements (Threats, Vulnerabilities, Risk, Formal Methods, etc.) #Sensor and Mobile ad hoc Network Security #Service and Systems Design and QOS Network Security #System Security #Intrusion Detection #Secure end Systems #Secure Operating Systems #Data Base Security #Security Infrastructures #Security Evaluation #Software Security #Security and Privacy in Mobile Systems #Security and Privacy in Pervasive/Ubiquitous Computing #Security and Privacy in Web Services #Security and Privacy Policies #Security Area Control #Security Deployment #Security Engineering #Security for Grid Computing #Security in Distributed Systems #Network Security #Internet Security #Firewalls #Mobile Security #Security Agents #Protocols #Anti-Virus and Anti-Hacker Measures #Content Protection #Software Protection #Tamper Resistant Software #Electronic Commerce #Electronic Government #Health #Telecommunications #Mobility #Foundations #Privacy #Access Control #Authentication #Identification #Applied Cryptography #Formal Methods in Information Security #PhD ademic #Scopus #SCI #LatticeScience #Springer, #ScienceDirect #IEEE #Mendeley #Research #Scholarship #UGC #SSRN #LatticeScience #ESCI #Science #Journal #Conference #SSRN #PubLons #PhD #Academic #Scopus #SCI #LatticeScience #Springer, #ScienceDirect #IEEE #Mendeley #Research #Scholarship #UGC #SSRN #LatticeScience #ESCI #Science #Journal #Conference #SSRN #PubLons</p>
<p>The post <a rel="nofollow" href="https://www.ijcns.latticescipub.com/portfolio-item/b143004021124/">B143004021124</a> appeared first on <a rel="nofollow" href="https://www.ijcns.latticescipub.com">Indian Journal of Cryptography and Network Security (IJCNS)</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>The Indian Journal of Cryptography and Network Security (IJCNS) has ISSN 2582-9238 (online), an open-access, peer-reviewed, periodical half-yearly international journal, which is published by Lattice Science Publication (LSP) in May and November. The aim of the journal is to publish high quality peer–reviewed original articles in the area of Cryptography and Network Security that covers Cryptographic Protocols, Cryptography and Coding, Untrace-Ability, Privacy and Authentication, Key Management, Authentication, Trust Management, Quantum Cryptography, Computational Intelligence in Security, Artificial Immune Systems, Biological &amp; Evolutionary, Computation, Intelligent Agents and Systems, Reinforcement &amp; Unsupervised Learning, Autonomy-Oriented Computing, Coevolutionary Algorithms, Fuzzy Systems, Biometric Security, Trust Models and Metrics, Regulation and Trust Mechanisms, Data Integrity, Models for Authentication, Trust and Authorization, Wireless Network Security, Information Hiding, Data &amp; System Integrity, Access Control and Intrusion Detection, Intrusion Detection and Vulnerability Assessment, Authentication and Non-Repudiation, Identification and Authentication Insider Threats and Countermeasures, Intrusion Detection &amp; Prevention, Secure Cloud Computing, Security Information Systems Architecture and Design and Security Patterns, Security Management, Security Requirements (Threats, Vulnerabilities, Risk, Formal Methods, etc.), Sensor and Mobile ad hoc Network Security, Service and Systems Design and QOS Network Security, System Security, Intrusion Detection, Secure end Systems, Secure Operating Systems, Data Base Security, Security Infrastructures, Security Evaluation, Software Security, Security and Privacy in Mobile Systems, Security and Privacy in Pervasive/Ubiquitous Computing, Security and Privacy in Web Services, Security and Privacy Policies, Security Area Control, Security Deployment, Security Engineering, Security for Grid Computing, Security in Distributed Systems, Network Security, Internet Security, Firewalls, Mobile Security, Security Agents, Protocols, Anti-Virus and Anti-Hacker Measures, Content Protection, Software Protection, Tamper Resistant Software, Electronic Commerce, Electronic Government, Health, Telecommunications, Mobility, Foundations, Privacy, Access Control, Identification, Applied Cryptography and Formal Methods in Information Security.#Cryptographic Protocols #Cryptography and Coding #Untrace-Ability #Privacy and Authentication #Key Management #Authentication #Trust Management #Quantum Cryptography #Computational Intelligence in Security #Artificial Immune Systems #Biological &amp; Evolutionary Computation #Intelligent Agents and Systems #Reinforcement &amp; Unsupervised Learning #Autonomy-Oriented Computing #Coevolutionary Algorithms #Fuzzy Systems #Biometric Security #Trust Models and Metrics #Regulation and Trust Mechanisms #Data Integrity #Models for Authentication #Trust and Authorization #Wireless Network Security #Information Hiding #Data &amp; System Integrity #Access Control and Intrusion Detection #Intusion Detection and Vulnerability Assessment #Authentication and Non-Repudiation #Identification and Authentication #Insider Threats and Countermeasures #Intrusion Detection &amp; Prevention #Secure Cloud Computing #Security Information Systems Architecture and Design and Security Patterns #Security Management #Security Requirements (Threats, Vulnerabilities, Risk, Formal Methods, etc.) #Sensor and Mobile ad hoc Network Security #Service and Systems Design and QOS Network Security #System Security #Intrusion Detection #Secure end Systems #Secure Operating Systems #Data Base Security #Security Infrastructures #Security Evaluation #Software Security #Security and Privacy in Mobile Systems #Security and Privacy in Pervasive/Ubiquitous Computing #Security and Privacy in Web Services #Security and Privacy Policies #Security Area Control #Security Deployment #Security Engineering #Security for Grid Computing #Security in Distributed Systems #Network Security #Internet Security #Firewalls #Mobile Security #Security Agents #Protocols #Anti-Virus and Anti-Hacker Measures #Content Protection #Software Protection #Tamper Resistant Software #Electronic Commerce #Electronic Government #Health #Telecommunications #Mobility #Foundations #Privacy #Access Control #Authentication #Identification #Applied Cryptography #Formal Methods in Information Security #PhD ademic #Scopus #SCI #LatticeScience #Springer, #ScienceDirect #IEEE #Mendeley #Research #Scholarship #UGC #SSRN #LatticeScience #ESCI #Science #Journal #Conference #SSRN #PubLons #PhD #Academic #Scopus #SCI #LatticeScience #Springer, #ScienceDirect #IEEE #Mendeley #Research #Scholarship #UGC #SSRN #LatticeScience #ESCI #Science #Journal #Conference #SSRN #PubLons</p>
<div class='__iawmlf-post-loop-links' style='display:none;' data-iawmlf-post-links='[{&quot;id&quot;:48,&quot;href&quot;:&quot;https:\/\/crossmark.crossref.org\/dialog\/?doi=10.54105\/ijcns.B1430.04021124&amp;domain=www.ijcns.latticescipub.com&quot;,&quot;archived_href&quot;:&quot;&quot;,&quot;redirect_href&quot;:&quot;&quot;,&quot;checks&quot;:[],&quot;broken&quot;:false,&quot;last_checked&quot;:null,&quot;process&quot;:&quot;done&quot;},{&quot;id&quot;:49,&quot;href&quot;:&quot;http:\/\/doi.org\/10.54105\/ijcns.B1430.04021124&quot;,&quot;archived_href&quot;:&quot;&quot;,&quot;redirect_href&quot;:&quot;https:\/\/doi.org\/10.54105\/ijcns.B1430.04021124&quot;,&quot;checks&quot;:[],&quot;broken&quot;:false,&quot;last_checked&quot;:null,&quot;process&quot;:&quot;done&quot;},{&quot;id&quot;:50,&quot;href&quot;:&quot;https:\/\/www.openaccess.nl\/en\/open-publications&quot;,&quot;archived_href&quot;:&quot;http:\/\/web-wp.archive.org\/web\/20241228104058\/https:\/\/www.openaccess.nl\/en\/open-publications&quot;,&quot;redirect_href&quot;:&quot;&quot;,&quot;checks&quot;:[{&quot;date&quot;:&quot;2025-12-15 07:42:16&quot;,&quot;http_code&quot;:404},{&quot;date&quot;:&quot;2025-12-18 08:02:48&quot;,&quot;http_code&quot;:404},{&quot;date&quot;:&quot;2025-12-21 18:23:17&quot;,&quot;http_code&quot;:404},{&quot;date&quot;:&quot;2025-12-24 19:59:21&quot;,&quot;http_code&quot;:404},{&quot;date&quot;:&quot;2025-12-28 16:39:39&quot;,&quot;http_code&quot;:404},{&quot;date&quot;:&quot;2025-12-31 22:36:42&quot;,&quot;http_code&quot;:503},{&quot;date&quot;:&quot;2026-01-05 09:23:34&quot;,&quot;http_code&quot;:404},{&quot;date&quot;:&quot;2026-01-08 10:48:51&quot;,&quot;http_code&quot;:404},{&quot;date&quot;:&quot;2026-01-11 21:41:19&quot;,&quot;http_code&quot;:404},{&quot;date&quot;:&quot;2026-01-15 06:57:07&quot;,&quot;http_code&quot;:404},{&quot;date&quot;:&quot;2026-01-18 18:33:46&quot;,&quot;http_code&quot;:503},{&quot;date&quot;:&quot;2026-01-22 07:02:42&quot;,&quot;http_code&quot;:404},{&quot;date&quot;:&quot;2026-01-25 21:53:32&quot;,&quot;http_code&quot;:404},{&quot;date&quot;:&quot;2026-01-29 15:33:33&quot;,&quot;http_code&quot;:404},{&quot;date&quot;:&quot;2026-02-02 13:42:46&quot;,&quot;http_code&quot;:503},{&quot;date&quot;:&quot;2026-02-06 07:12:10&quot;,&quot;http_code&quot;:404},{&quot;date&quot;:&quot;2026-02-10 08:20:32&quot;,&quot;http_code&quot;:503},{&quot;date&quot;:&quot;2026-02-13 14:11:44&quot;,&quot;http_code&quot;:404},{&quot;date&quot;:&quot;2026-02-16 20:04:18&quot;,&quot;http_code&quot;:404},{&quot;date&quot;:&quot;2026-02-20 13:50:59&quot;,&quot;http_code&quot;:404},{&quot;date&quot;:&quot;2026-02-25 17:09:49&quot;,&quot;http_code&quot;:404},{&quot;date&quot;:&quot;2026-02-28 21:11:01&quot;,&quot;http_code&quot;:404},{&quot;date&quot;:&quot;2026-05-01 13:17:51&quot;,&quot;http_code&quot;:404}],&quot;broken&quot;:true,&quot;last_checked&quot;:{&quot;date&quot;:&quot;2026-05-01 13:17:51&quot;,&quot;http_code&quot;:404},&quot;process&quot;:&quot;done&quot;},{&quot;id&quot;:21,&quot;href&quot;:&quot;https:\/\/citation.crosscite.org&quot;,&quot;archived_href&quot;:&quot;http:\/\/web-wp.archive.org\/web\/20250115122456\/https:\/\/citation.crosscite.org:443\/&quot;,&quot;redirect_href&quot;:&quot;&quot;,&quot;checks&quot;:[{&quot;date&quot;:&quot;2025-12-15 07:33:16&quot;,&quot;http_code&quot;:200},{&quot;date&quot;:&quot;2025-12-20 14:22:24&quot;,&quot;http_code&quot;:200},{&quot;date&quot;:&quot;2025-12-23 14:26:51&quot;,&quot;http_code&quot;:200},{&quot;date&quot;:&quot;2025-12-27 09:31:15&quot;,&quot;http_code&quot;:200},{&quot;date&quot;:&quot;2025-12-30 23:02:26&quot;,&quot;http_code&quot;:503},{&quot;date&quot;:&quot;2026-01-05 12:39:31&quot;,&quot;http_code&quot;:200},{&quot;date&quot;:&quot;2026-01-08 20:31:32&quot;,&quot;http_code&quot;:200},{&quot;date&quot;:&quot;2026-01-14 10:29:11&quot;,&quot;http_code&quot;:200},{&quot;date&quot;:&quot;2026-01-19 12:09:28&quot;,&quot;http_code&quot;:200},{&quot;date&quot;:&quot;2026-01-23 00:28:53&quot;,&quot;http_code&quot;:200},{&quot;date&quot;:&quot;2026-01-28 08:03:59&quot;,&quot;http_code&quot;:200},{&quot;date&quot;:&quot;2026-01-31 20:11:59&quot;,&quot;http_code&quot;:200},{&quot;date&quot;:&quot;2026-02-04 10:55:53&quot;,&quot;http_code&quot;:200},{&quot;date&quot;:&quot;2026-02-10 08:20:31&quot;,&quot;http_code&quot;:200},{&quot;date&quot;:&quot;2026-02-13 14:11:45&quot;,&quot;http_code&quot;:200},{&quot;date&quot;:&quot;2026-02-16 15:03:16&quot;,&quot;http_code&quot;:200},{&quot;date&quot;:&quot;2026-02-20 07:11:28&quot;,&quot;http_code&quot;:200},{&quot;date&quot;:&quot;2026-02-24 01:25:48&quot;,&quot;http_code&quot;:200},{&quot;date&quot;:&quot;2026-02-27 10:39:17&quot;,&quot;http_code&quot;:200},{&quot;date&quot;:&quot;2026-03-03 03:22:09&quot;,&quot;http_code&quot;:200},{&quot;date&quot;:&quot;2026-05-01 13:17:52&quot;,&quot;http_code&quot;:200}],&quot;broken&quot;:false,&quot;last_checked&quot;:{&quot;date&quot;:&quot;2026-05-01 13:17:52&quot;,&quot;http_code&quot;:200},&quot;process&quot;:&quot;done&quot;},{&quot;id&quot;:51,&quot;href&quot;:&quot;https:\/\/zenodo.org\/records\/14560830&quot;,&quot;archived_href&quot;:&quot;http:\/\/web-wp.archive.org\/web\/20250429064507\/https:\/\/zenodo.org\/records\/14560830&quot;,&quot;redirect_href&quot;:&quot;&quot;,&quot;checks&quot;:[{&quot;date&quot;:&quot;2025-12-15 07:42:20&quot;,&quot;http_code&quot;:200},{&quot;date&quot;:&quot;2026-01-02 05:53:33&quot;,&quot;http_code&quot;:200},{&quot;date&quot;:&quot;2026-01-09 04:25:35&quot;,&quot;http_code&quot;:200},{&quot;date&quot;:&quot;2026-02-12 20:27:53&quot;,&quot;http_code&quot;:200},{&quot;date&quot;:&quot;2026-02-18 13:05:49&quot;,&quot;http_code&quot;:200},{&quot;date&quot;:&quot;2026-02-25 17:09:45&quot;,&quot;http_code&quot;:200},{&quot;date&quot;:&quot;2026-03-02 17:41:32&quot;,&quot;http_code&quot;:200},{&quot;date&quot;:&quot;2026-05-01 13:17:53&quot;,&quot;http_code&quot;:200}],&quot;broken&quot;:false,&quot;last_checked&quot;:{&quot;date&quot;:&quot;2026-05-01 13:17:53&quot;,&quot;http_code&quot;:200},&quot;process&quot;:&quot;done&quot;},{&quot;id&quot;:52,&quot;href&quot;:&quot;https:\/\/www.journals.latticescipub.com\/index.php\/ijcns\/issue\/view\/274&quot;,&quot;archived_href&quot;:&quot;http:\/\/web-wp.archive.org\/web\/20251215081011\/https:\/\/www.journals.latticescipub.com\/index.php\/ijcns\/issue\/view\/274&quot;,&quot;redirect_href&quot;:&quot;&quot;,&quot;checks&quot;:[{&quot;date&quot;:&quot;2025-12-15 17:02:56&quot;,&quot;http_code&quot;:200},{&quot;date&quot;:&quot;2025-12-22 09:59:53&quot;,&quot;http_code&quot;:200},{&quot;date&quot;:&quot;2025-12-31 10:39:28&quot;,&quot;http_code&quot;:200},{&quot;date&quot;:&quot;2026-01-09 04:25:37&quot;,&quot;http_code&quot;:200},{&quot;date&quot;:&quot;2026-01-16 17:46:25&quot;,&quot;http_code&quot;:200},{&quot;date&quot;:&quot;2026-01-20 05:32:29&quot;,&quot;http_code&quot;:200},{&quot;date&quot;:&quot;2026-01-29 15:33:33&quot;,&quot;http_code&quot;:200},{&quot;date&quot;:&quot;2026-02-12 20:27:53&quot;,&quot;http_code&quot;:200},{&quot;date&quot;:&quot;2026-02-16 21:05:04&quot;,&quot;http_code&quot;:200},{&quot;date&quot;:&quot;2026-02-21 05:08:35&quot;,&quot;http_code&quot;:200},{&quot;date&quot;:&quot;2026-02-25 17:09:40&quot;,&quot;http_code&quot;:200},{&quot;date&quot;:&quot;2026-03-01 08:25:25&quot;,&quot;http_code&quot;:200},{&quot;date&quot;:&quot;2026-05-01 13:17:51&quot;,&quot;http_code&quot;:200}],&quot;broken&quot;:false,&quot;last_checked&quot;:{&quot;date&quot;:&quot;2026-05-01 13:17:51&quot;,&quot;http_code&quot;:200},&quot;process&quot;:&quot;done&quot;},{&quot;id&quot;:24,&quot;href&quot;:&quot;http:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0&quot;,&quot;archived_href&quot;:&quot;http:\/\/web-wp.archive.org\/web\/20251214135420\/https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0\/&quot;,&quot;redirect_href&quot;:&quot;&quot;,&quot;checks&quot;:[{&quot;date&quot;:&quot;2025-12-15 07:33:23&quot;,&quot;http_code&quot;:206},{&quot;date&quot;:&quot;2025-12-20 14:22:24&quot;,&quot;http_code&quot;:200},{&quot;date&quot;:&quot;2025-12-23 14:26:49&quot;,&quot;http_code&quot;:206},{&quot;date&quot;:&quot;2025-12-27 09:31:15&quot;,&quot;http_code&quot;:206},{&quot;date&quot;:&quot;2025-12-30 23:02:17&quot;,&quot;http_code&quot;:206},{&quot;date&quot;:&quot;2026-01-05 12:39:33&quot;,&quot;http_code&quot;:206},{&quot;date&quot;:&quot;2026-01-08 20:31:32&quot;,&quot;http_code&quot;:206},{&quot;date&quot;:&quot;2026-01-14 10:29:11&quot;,&quot;http_code&quot;:206},{&quot;date&quot;:&quot;2026-01-19 12:09:28&quot;,&quot;http_code&quot;:206},{&quot;date&quot;:&quot;2026-01-23 00:28:53&quot;,&quot;http_code&quot;:206},{&quot;date&quot;:&quot;2026-01-28 08:04:01&quot;,&quot;http_code&quot;:206},{&quot;date&quot;:&quot;2026-01-31 20:11:59&quot;,&quot;http_code&quot;:206},{&quot;date&quot;:&quot;2026-02-04 10:55:51&quot;,&quot;http_code&quot;:206},{&quot;date&quot;:&quot;2026-02-10 08:20:31&quot;,&quot;http_code&quot;:206},{&quot;date&quot;:&quot;2026-02-13 14:11:44&quot;,&quot;http_code&quot;:206},{&quot;date&quot;:&quot;2026-02-16 15:03:15&quot;,&quot;http_code&quot;:206},{&quot;date&quot;:&quot;2026-02-20 07:11:27&quot;,&quot;http_code&quot;:206},{&quot;date&quot;:&quot;2026-02-24 01:25:48&quot;,&quot;http_code&quot;:206},{&quot;date&quot;:&quot;2026-02-27 10:39:18&quot;,&quot;http_code&quot;:206},{&quot;date&quot;:&quot;2026-03-03 03:22:09&quot;,&quot;http_code&quot;:206},{&quot;date&quot;:&quot;2026-05-01 13:17:51&quot;,&quot;http_code&quot;:206}],&quot;broken&quot;:false,&quot;last_checked&quot;:{&quot;date&quot;:&quot;2026-05-01 13:17:51&quot;,&quot;http_code&quot;:206},&quot;process&quot;:&quot;done&quot;}]'></div>
<div  class='flex_column av-46k49x-6b65dc348a66e10f3304d7c2d6922223 av_one_full  avia-builder-el-0  el_before_av_social_share  avia-builder-el-first  first flex_column_div  '     ><div  class='av_promobox av-m50zvv56-6720f11a70ea6cf47b62b42fc282b84c avia-button-yes  avia-builder-el-1  avia-builder-el-no-sibling '><div class='avia-promocontent'></p>
<p style="text-align: justify;"><span style="font-family: 'times new roman', times, serif;"><span style="font-size: 14pt;"><strong><span style="font-size: 18pt;">IoT Sensor-Based Convolutional Neural Network System for Concealed Weapon Detector for Security Enhancement</span><a href="https://crossmark.crossref.org/dialog/?doi=10.54105/ijcns.B1430.04021124&amp;domain=www.ijcns.latticescipub.com"><img decoding="async" id="crossmark-icon" class="alignright" src="https://crossmark-cdn.crossref.org/widget/v2.0/logos/CROSSMARK_Color_horizontal.svg" alt="CROSSMARK Color horizontal" width="150" height="33"></a><br />
</strong>Moradeke Grace Adewumi<strong><span style="font-size: 12pt;"><sup>1</sup></span></strong>, Ese Sophia Mughele<strong><span style="font-size: 12pt;"><sup>2</sup></span></strong>, Akinribido Comfort Tomiye<strong><span style="font-size: 12pt;"><sup>3</sup></span></strong>, Rowland Ogunrinde<strong><span style="font-size: 12pt;"><sup>4</sup></span></strong>, Stella Chinye Chiemeke<strong><span style="font-size: 12pt;"><sup>5</sup></span></strong>, Olumide Sunday Adewale<strong><span style="font-size: 12pt;"><sup>6</sup></span></strong></span></span></p>
<p style="text-align: justify;"><span style="font-size: 12pt;"><span style="font-family: 'times new roman', times, serif;"><span style="font-family: 'times new roman', times, serif;">
<style type="text/css" data-created_by="avia_inline_auto" id="style-css-av-4fvjvr-5974f8027c52f0c7439a7512d032d495">
.av_font_icon.av-4fvjvr-5974f8027c52f0c7439a7512d032d495{
color:#4392e8;
border-color:#4392e8;
}
.avia-svg-icon.av-4fvjvr-5974f8027c52f0c7439a7512d032d495 svg:first-child{
stroke:#4392e8;
fill:#4392e8;
}
.av_font_icon.av-4fvjvr-5974f8027c52f0c7439a7512d032d495 .av-icon-char{
font-size:20px;
line-height:20px;
}
</style>
<span  class='av_font_icon av-4fvjvr-5974f8027c52f0c7439a7512d032d495 avia_animate_when_visible av-icon-style- avia-icon-pos-left avia-iconfont avia-font-entypo-fontello avia-icon-animate'><span class='av-icon-char' data-av_icon='' data-av_iconfont='entypo-fontello' aria-hidden="true" data-avia-icon-tooltip="adewumi.moradeke@bouesti.edu.ng "></span></span><sup><strong>1</strong></sup>Moradeke Grace Adewumi, Department of Computing and Information Science, Bamidele Olumilua University of Education, Science and Technology Ikere-Ekiti. Ekiti State Nigeria.<br />
</span></span></span></p>
<p style="text-align: justify;"><span style="font-size: 12pt;"><span style="font-family: 'times new roman', times, serif;"><span style="font-family: 'times new roman', times, serif;"><sup><strong>2</strong></sup>Ese Sophia Mughele, Department of Cyber Security, University of Delta, Agbor. Delta State, Nigeria.<br />
</span></span></span></p>
<p style="text-align: justify;"><span style="font-size: 12pt;"><span style="font-family: 'times new roman', times, serif;"><span style="font-family: 'times new roman', times, serif;">
<style type="text/css" data-created_by="avia_inline_auto" id="style-css-av-4fvjvr-3-0d0d9921aef4e9e47afcf2b4c2b82319">
.av_font_icon.av-4fvjvr-3-0d0d9921aef4e9e47afcf2b4c2b82319{
color:#4392e8;
border-color:#4392e8;
}
.avia-svg-icon.av-4fvjvr-3-0d0d9921aef4e9e47afcf2b4c2b82319 svg:first-child{
stroke:#4392e8;
fill:#4392e8;
}
.av_font_icon.av-4fvjvr-3-0d0d9921aef4e9e47afcf2b4c2b82319 .av-icon-char{
font-size:20px;
line-height:20px;
}
</style>
<span  class='av_font_icon av-4fvjvr-3-0d0d9921aef4e9e47afcf2b4c2b82319 avia_animate_when_visible av-icon-style- avia-icon-pos-left avia-iconfont avia-font-entypo-fontello avia-icon-animate'><span class='av-icon-char' data-av_icon='' data-av_iconfont='entypo-fontello' aria-hidden="true" data-avia-icon-tooltip="comforttomiye@gmail.com"></span></span><sup><strong>3</strong></sup>Akinribido Comfort Tomiye, Department of Computing and Information Science, Bamidele Olumilua University of Education, Science and Technology Ikere-Ekiti. Ekiti State Nigeria.<br />
</span></span></span></p>
<p style="text-align: justify;"><span style="font-size: 12pt;"><span style="font-family: 'times new roman', times, serif;"><span style="font-family: 'times new roman', times, serif;"><sup><strong>4</strong></sup>Rowland Ogunrinde, Department of Computing and Information Science, Bamidele Olumilua University of Education, Science and Technology Ikere-Ekiti. Ekiti State Nigeria.<br />
</span></span></span></p>
<p style="text-align: justify;"><span style="font-size: 12pt;"><span style="font-family: 'times new roman', times, serif;"><span style="font-family: 'times new roman', times, serif;"><sup><strong>5</strong></sup>Stella Chinye Chiemeke, Department of Cyber Security, University of Delta, Agbor. Delta State, Nigeria.<br />
</span></span></span></p>
<p style="text-align: justify;"><span style="font-size: 12pt;"><span style="font-family: 'times new roman', times, serif;"><span style="font-family: 'times new roman', times, serif;"><sup><strong>6</strong></sup>Olumide Sunday Adewale, Department of Computer Science, Federal University of Technology, Akure. Ondo State, Nigeria. </span></span></span></p>
<p style="text-align: justify;"><span style="font-family: 'times new roman', times, serif; font-size: 12pt;">Manuscript received on 12 January 2024<strong> |</strong> Revised Manuscript received on 10 November 2024 <strong>|</strong> Manuscript Accepted on 15 November 2024<strong> |</strong> Manuscript published on 30 November 2024 <strong>|</strong> PP: 19-25 <strong>|</strong> Volume-4 Issue-2, November 2024 <strong>|</strong> Retrieval Number: 100.1/ijcns.B143004021124 <strong>|</strong> DOI: <a href="http://doi.org/10.54105/ijcns.B1430.04021124" target="_blank" rel="noopener">10.54105/ijcns.B1430.04021124</a></span></p>
<p style="text-align: justify;"><span style="font-size: 12pt;"> <span style="font-family: 'times new roman', times, serif;"><i class="fa fa-unlock-alt" style="color: blue;"></i><a href="https://www.openaccess.nl/en/open-publications" target="_blank" rel="noopener"> Open Access</a><strong> |</strong> <i class="far fa-file-alt" style="color: blue;"></i><a href="https://www.ijcns.latticescipub.com/ethics-policies/"> Ethics and Policies</a> | <i class="fa fa-quote-right" style="color: blue;"></i><a href="https://citation.crosscite.org/" target="_blank" rel="noopener"> Cite</a> <strong>|</strong> <i class="fa fa-plus" style="color: blue;" aria-hidden="true"></i><a href="https://zenodo.org/records/14560830" target="_blank" rel="noopener"> Zenodo</a> </span><span style="font-family: 'times new roman', times, serif;"><strong>|</strong> <i class="fa fa-plus" style="color: blue;" aria-hidden="true"></i><a href="https://www.journals.latticescipub.com/index.php/ijcns/issue/view/274"> OJS</a> <strong>|</strong> <i class="fa fa-database" style="color: blue;" aria-hidden="true"></i><a href="https://www.ijcns.latticescipub.com/indexing/"> Indexing and Abstracting</a></span></span><br />
<span style="font-family: 'times new roman', times, serif; font-size: 10pt;">© The Authors. Published by Lattice Science Publication (LSP). This is an <a href="https://www.openaccess.nl/en/open-publications" target="_blank" rel="noopener">open-access</a> article under the CC-BY-NC-ND license (<a href="http://creativecommons.org/licenses/by-nc-nd/4.0/" target="_blank" rel="noopener">http://creativecommons.org/licenses/by-nc-nd/4.0/</a>)</span></p>
<p style="text-align: justify;"><span style="font-size: 14pt;"><strong style="font-family: 'times new roman', times, serif;">Abstract:</strong><span style="font-family: times new roman, times, serif;"> Security has been a major concern in our societies due to the rise in crime rate, most especially in a crowded area. Concealed weapons have been posing a significant threat to government, law enforcement, security agencies, and civilians. Existing weapons detection systems seem to be not culpable of detecting concealed weapons without the cooperation of the person being searched. There remains a need for a weapons detector that can detect and identify concealed weapons for security enhancement in Nigeria. For this purpose, computer vision methods and a deep learning approach were applied for the identification of a weapon from captured images downloaded from the internet as a prototype for the study. Recent work in deep learning and machine learning using convolutional neural networks has shown considerable progress in the areas of object detection and recognition. The CNN algorithms are trained on the collected datasets to identify and differentiate between weapons and non-weapons. We built a concealed weapon detection system prototype and conducted a series of experiments to test the system&#8217;s accuracy, precision, and false positives. The models were compared by evaluating their average values of sensitivity, specificity, F1 score, accuracy, and the area under the receiver operating characteristic curve (AUC). The experimental findings clearly demonstrated that the ResNet-50 model performed better than the VGG-16 and Alex Net models in terms of sensitivity, specificity, and accuracy.</span></span></p>
<p style="text-align: justify;"><span style="font-family: 'times new roman', times, serif; font-size: 12pt;"><span style="font-size: 14pt;"><strong>Keywords: </strong><span style="font-family: times new roman, times, serif;">Concealed Weapon, Detector, Insecurity, Internet of Things.</span></span><br />
<span style="font-size: 14pt;"> <strong>Scope of the Article:</strong> Information Security</span><br />
</span></p>
<p>
</div><div  class='avia-button-wrap av-m50zvv56-46cc00f6d0fe7162d67e103ae62036b9-wrap avia-button-right '><a href="https://www.ijcns.latticescipub.com/wp-content/uploads/papers/v4i2/B143004021124.pdf" class="avia-button av-m50zvv56-46cc00f6d0fe7162d67e103ae62036b9 av-link-btn avia-icon_select-yes-left-icon avia-size-medium avia-position-right avia-color-theme-color" aria-label="Download PDF"><span class='avia_button_icon avia_button_icon_left avia-iconfont avia-font-entypo-fontello' data-av_icon='' data-av_iconfont='entypo-fontello' ></span><span class='avia_iconbox_title' >Download PDF</span></a></div></div></div><div  class='av-social-sharing-box av-2p53vp-3c40015a61f2da913b171d8622de8c40 av-social-sharing-box-default  avia-builder-el-4  el_after_av_one_full  avia-builder-el-last  av-social-sharing-box-fullwidth'><div class="av-share-box"><h5 class='av-share-link-description av-no-toc '>Share this entry</h5><ul class="av-share-box-list noLightbox"><li class='av-share-link av-social-link-facebook avia_social_iconfont' ><a target="_blank" aria-label="Share on Facebook" href="https://www.facebook.com/sharer.php?u=https://www.ijcns.latticescipub.com/portfolio-item/b143004021124/&#038;t=B143004021124" data-av_icon="" data-av_iconfont="entypo-fontello" title="" data-avia-related-tooltip="Share on Facebook"><span class='avia_hidden_link_text'>Share on Facebook</span></a></li><li class='av-share-link av-social-link-twitter avia_social_iconfont' ><a target="_blank" aria-label="Share on X" href="https://twitter.com/share?text=B143004021124&#038;url=https://www.ijcns.latticescipub.com/?p=1061" data-av_icon="" data-av_iconfont="entypo-fontello" title="" data-avia-related-tooltip="Share on X"><span class='avia_hidden_link_text'>Share on X</span></a></li><li class='av-share-link av-social-link-whatsapp avia_social_iconfont' ><a target="_blank" aria-label="Share on WhatsApp" href="https://api.whatsapp.com/send?text=https://www.ijcns.latticescipub.com/portfolio-item/b143004021124/" data-av_icon="" data-av_iconfont="entypo-fontello" title="" data-avia-related-tooltip="Share on WhatsApp"><span class='avia_hidden_link_text'>Share on WhatsApp</span></a></li><li class='av-share-link av-social-link-pinterest avia_social_iconfont' ><a target="_blank" aria-label="Share on Pinterest" href="https://pinterest.com/pin/create/button/?url=https%3A%2F%2Fwww.ijcns.latticescipub.com%2Fportfolio-item%2Fb143004021124%2F&#038;description=B143004021124&#038;media=" data-av_icon="" data-av_iconfont="entypo-fontello" title="" data-avia-related-tooltip="Share on Pinterest"><span class='avia_hidden_link_text'>Share on Pinterest</span></a></li><li class='av-share-link av-social-link-linkedin avia_social_iconfont' ><a target="_blank" aria-label="Share on LinkedIn" href="https://linkedin.com/shareArticle?mini=true&#038;title=B143004021124&#038;url=https://www.ijcns.latticescipub.com/portfolio-item/b143004021124/" data-av_icon="" data-av_iconfont="entypo-fontello" title="" data-avia-related-tooltip="Share on LinkedIn"><span class='avia_hidden_link_text'>Share on LinkedIn</span></a></li><li class='av-share-link av-social-link-tumblr avia_social_iconfont' ><a target="_blank" aria-label="Share on Tumblr" href="https://www.tumblr.com/share/link?url=https%3A%2F%2Fwww.ijcns.latticescipub.com%2Fportfolio-item%2Fb143004021124%2F&#038;name=B143004021124&#038;description=" data-av_icon="" data-av_iconfont="entypo-fontello" title="" data-avia-related-tooltip="Share on Tumblr"><span class='avia_hidden_link_text'>Share on Tumblr</span></a></li><li class='av-share-link av-social-link-vk avia_social_iconfont' ><a target="_blank" aria-label="Share on Vk" href="https://vk.com/share.php?url=https://www.ijcns.latticescipub.com/portfolio-item/b143004021124/" data-av_icon="" data-av_iconfont="entypo-fontello" title="" data-avia-related-tooltip="Share on Vk"><span class='avia_hidden_link_text'>Share on Vk</span></a></li><li class='av-share-link av-social-link-reddit avia_social_iconfont' ><a target="_blank" aria-label="Share on Reddit" href="https://reddit.com/submit?url=https://www.ijcns.latticescipub.com/portfolio-item/b143004021124/&#038;title=B143004021124" data-av_icon="" data-av_iconfont="entypo-fontello" title="" data-avia-related-tooltip="Share on Reddit"><span class='avia_hidden_link_text'>Share on Reddit</span></a></li><li class='av-share-link av-social-link-mail avia_social_iconfont' ><a  aria-label="Share by Mail" href='mailto:?subject=B143004021124&#038;body=https://www.ijcns.latticescipub.com/portfolio-item/b143004021124/' data-av_icon='' data-av_iconfont='entypo-fontello'  title='' data-avia-related-tooltip='Share by Mail'><span class='avia_hidden_link_text'>Share by Mail</span></a></li><li class='av-share-link av-social-link-yelp avia_social_iconfont' ><a target="_blank" aria-label="Visit us on Yelp" href="https://www.yelp.com" data-av_icon="" data-av_iconfont="entypo-fontello" title="" data-avia-related-tooltip="Visit us on Yelp" rel="noopener"><span class='avia_hidden_link_text'>Visit us on Yelp</span></a></li></ul></div></div></p>
<p>The post <a rel="nofollow" href="https://www.ijcns.latticescipub.com/portfolio-item/b143004021124/">B143004021124</a> appeared first on <a rel="nofollow" href="https://www.ijcns.latticescipub.com">Indian Journal of Cryptography and Network Security (IJCNS)</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>B143204021124</title>
		<link>https://www.ijcns.latticescipub.com/portfolio-item/b143204021124/</link>
		
		<dc:creator><![CDATA[IJCNS Journal]]></dc:creator>
		<pubDate>Mon, 25 Nov 2024 07:14:21 +0000</pubDate>
				<guid isPermaLink="false">https://www.ijcns.latticescipub.com/?post_type=portfolio&#038;p=1047</guid>

					<description><![CDATA[<p>The Indian Journal of Cryptography and Network Security (IJCNS) has ISSN 2582-9238 (online), an open-access, peer-reviewed, periodical half-yearly international journal, which is published by Lattice Science Publication (LSP) in May and November. The aim of the journal is to publish high quality peer–reviewed original articles in the area of Cryptography and Network Security that covers Cryptographic Protocols, Cryptography and Coding, Untrace-Ability, Privacy and Authentication, Key Management, Authentication, Trust Management, Quantum Cryptography, Computational Intelligence in Security, Artificial Immune Systems, Biological &amp; Evolutionary, Computation, Intelligent Agents and Systems, Reinforcement &amp; Unsupervised Learning, Autonomy-Oriented Computing, Coevolutionary Algorithms, Fuzzy Systems, Biometric Security, Trust Models and Metrics, Regulation and Trust Mechanisms, Data Integrity, Models for Authentication, Trust and Authorization, Wireless Network Security, Information Hiding, Data &amp; System Integrity, Access Control and Intrusion Detection, Intrusion Detection and Vulnerability Assessment, Authentication and Non-Repudiation, Identification and Authentication Insider Threats and Countermeasures, Intrusion Detection &amp; Prevention, Secure Cloud Computing, Security Information Systems Architecture and Design and Security Patterns, Security Management, Security Requirements (Threats, Vulnerabilities, Risk, Formal Methods, etc.), Sensor and Mobile ad hoc Network Security, Service and Systems Design and QOS Network Security, System Security, Intrusion Detection, Secure end Systems, Secure Operating Systems, Data Base Security, Security Infrastructures, Security Evaluation, Software Security, Security and Privacy in Mobile Systems, Security and Privacy in Pervasive/Ubiquitous Computing, Security and Privacy in Web Services, Security and Privacy Policies, Security Area Control, Security Deployment, Security Engineering, Security for Grid Computing, Security in Distributed Systems, Network Security, Internet Security, Firewalls, Mobile Security, Security Agents, Protocols, Anti-Virus and Anti-Hacker Measures, Content Protection, Software Protection, Tamper Resistant Software, Electronic Commerce, Electronic Government, Health, Telecommunications, Mobility, Foundations, Privacy, Access Control, Identification, Applied Cryptography and Formal Methods in Information Security.#Cryptographic Protocols #Cryptography and Coding #Untrace-Ability #Privacy and Authentication #Key Management #Authentication #Trust Management #Quantum Cryptography #Computational Intelligence in Security #Artificial Immune Systems #Biological &amp; Evolutionary Computation #Intelligent Agents and Systems #Reinforcement &amp; Unsupervised Learning #Autonomy-Oriented Computing #Coevolutionary Algorithms #Fuzzy Systems #Biometric Security #Trust Models and Metrics #Regulation and Trust Mechanisms #Data Integrity #Models for Authentication #Trust and Authorization #Wireless Network Security #Information Hiding #Data &amp; System Integrity #Access Control and Intrusion Detection #Intusion Detection and Vulnerability Assessment #Authentication and Non-Repudiation #Identification and Authentication #Insider Threats and Countermeasures #Intrusion Detection &amp; Prevention #Secure Cloud Computing #Security Information Systems Architecture and Design and Security Patterns #Security Management #Security Requirements (Threats, Vulnerabilities, Risk, Formal Methods, etc.) #Sensor and Mobile ad hoc Network Security #Service and Systems Design and QOS Network Security #System Security #Intrusion Detection #Secure end Systems #Secure Operating Systems #Data Base Security #Security Infrastructures #Security Evaluation #Software Security #Security and Privacy in Mobile Systems #Security and Privacy in Pervasive/Ubiquitous Computing #Security and Privacy in Web Services #Security and Privacy Policies #Security Area Control #Security Deployment #Security Engineering #Security for Grid Computing #Security in Distributed Systems #Network Security #Internet Security #Firewalls #Mobile Security #Security Agents #Protocols #Anti-Virus and Anti-Hacker Measures #Content Protection #Software Protection #Tamper Resistant Software #Electronic Commerce #Electronic Government #Health #Telecommunications #Mobility #Foundations #Privacy #Access Control #Authentication #Identification #Applied Cryptography #Formal Methods in Information Security #PhD ademic #Scopus #SCI #LatticeScience #Springer, #ScienceDirect #IEEE #Mendeley #Research #Scholarship #UGC #SSRN #LatticeScience #ESCI #Science #Journal #Conference #SSRN #PubLons #PhD #Academic #Scopus #SCI #LatticeScience #Springer, #ScienceDirect #IEEE #Mendeley #Research #Scholarship #UGC #SSRN #LatticeScience #ESCI #Science #Journal #Conference #SSRN #PubLons</p>
<p>The post <a rel="nofollow" href="https://www.ijcns.latticescipub.com/portfolio-item/b143204021124/">B143204021124</a> appeared first on <a rel="nofollow" href="https://www.ijcns.latticescipub.com">Indian Journal of Cryptography and Network Security (IJCNS)</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>The Indian Journal of Cryptography and Network Security (IJCNS) has ISSN 2582-9238 (online), an open-access, peer-reviewed, periodical half-yearly international journal, which is published by Lattice Science Publication (LSP) in May and November. The aim of the journal is to publish high quality peer–reviewed original articles in the area of Cryptography and Network Security that covers Cryptographic Protocols, Cryptography and Coding, Untrace-Ability, Privacy and Authentication, Key Management, Authentication, Trust Management, Quantum Cryptography, Computational Intelligence in Security, Artificial Immune Systems, Biological &amp; Evolutionary, Computation, Intelligent Agents and Systems, Reinforcement &amp; Unsupervised Learning, Autonomy-Oriented Computing, Coevolutionary Algorithms, Fuzzy Systems, Biometric Security, Trust Models and Metrics, Regulation and Trust Mechanisms, Data Integrity, Models for Authentication, Trust and Authorization, Wireless Network Security, Information Hiding, Data &amp; System Integrity, Access Control and Intrusion Detection, Intrusion Detection and Vulnerability Assessment, Authentication and Non-Repudiation, Identification and Authentication Insider Threats and Countermeasures, Intrusion Detection &amp; Prevention, Secure Cloud Computing, Security Information Systems Architecture and Design and Security Patterns, Security Management, Security Requirements (Threats, Vulnerabilities, Risk, Formal Methods, etc.), Sensor and Mobile ad hoc Network Security, Service and Systems Design and QOS Network Security, System Security, Intrusion Detection, Secure end Systems, Secure Operating Systems, Data Base Security, Security Infrastructures, Security Evaluation, Software Security, Security and Privacy in Mobile Systems, Security and Privacy in Pervasive/Ubiquitous Computing, Security and Privacy in Web Services, Security and Privacy Policies, Security Area Control, Security Deployment, Security Engineering, Security for Grid Computing, Security in Distributed Systems, Network Security, Internet Security, Firewalls, Mobile Security, Security Agents, Protocols, Anti-Virus and Anti-Hacker Measures, Content Protection, Software Protection, Tamper Resistant Software, Electronic Commerce, Electronic Government, Health, Telecommunications, Mobility, Foundations, Privacy, Access Control, Identification, Applied Cryptography and Formal Methods in Information Security.#Cryptographic Protocols #Cryptography and Coding #Untrace-Ability #Privacy and Authentication #Key Management #Authentication #Trust Management #Quantum Cryptography #Computational Intelligence in Security #Artificial Immune Systems #Biological &amp; Evolutionary Computation #Intelligent Agents and Systems #Reinforcement &amp; Unsupervised Learning #Autonomy-Oriented Computing #Coevolutionary Algorithms #Fuzzy Systems #Biometric Security #Trust Models and Metrics #Regulation and Trust Mechanisms #Data Integrity #Models for Authentication #Trust and Authorization #Wireless Network Security #Information Hiding #Data &amp; System Integrity #Access Control and Intrusion Detection #Intusion Detection and Vulnerability Assessment #Authentication and Non-Repudiation #Identification and Authentication #Insider Threats and Countermeasures #Intrusion Detection &amp; Prevention #Secure Cloud Computing #Security Information Systems Architecture and Design and Security Patterns #Security Management #Security Requirements (Threats, Vulnerabilities, Risk, Formal Methods, etc.) #Sensor and Mobile ad hoc Network Security #Service and Systems Design and QOS Network Security #System Security #Intrusion Detection #Secure end Systems #Secure Operating Systems #Data Base Security #Security Infrastructures #Security Evaluation #Software Security #Security and Privacy in Mobile Systems #Security and Privacy in Pervasive/Ubiquitous Computing #Security and Privacy in Web Services #Security and Privacy Policies #Security Area Control #Security Deployment #Security Engineering #Security for Grid Computing #Security in Distributed Systems #Network Security #Internet Security #Firewalls #Mobile Security #Security Agents #Protocols #Anti-Virus and Anti-Hacker Measures #Content Protection #Software Protection #Tamper Resistant Software #Electronic Commerce #Electronic Government #Health #Telecommunications #Mobility #Foundations #Privacy #Access Control #Authentication #Identification #Applied Cryptography #Formal Methods in Information Security #PhD ademic #Scopus #SCI #LatticeScience #Springer, #ScienceDirect #IEEE #Mendeley #Research #Scholarship #UGC #SSRN #LatticeScience #ESCI #Science #Journal #Conference #SSRN #PubLons #PhD #Academic #Scopus #SCI #LatticeScience #Springer, #ScienceDirect #IEEE #Mendeley #Research #Scholarship #UGC #SSRN #LatticeScience #ESCI #Science #Journal #Conference #SSRN #PubLons</p>
<div class='__iawmlf-post-loop-links' style='display:none;' data-iawmlf-post-links='[{&quot;id&quot;:53,&quot;href&quot;:&quot;https:\/\/crossmark.crossref.org\/dialog\/?doi=10.54105\/ijcns.B1432.04021124&amp;domain=https:\/\/www.ijcns.latticescipub.com&quot;,&quot;archived_href&quot;:&quot;&quot;,&quot;redirect_href&quot;:&quot;&quot;,&quot;checks&quot;:[],&quot;broken&quot;:false,&quot;last_checked&quot;:null,&quot;process&quot;:&quot;done&quot;},{&quot;id&quot;:54,&quot;href&quot;:&quot;http:\/\/doi.org\/10.54105\/ijcns.B1432.04021124&quot;,&quot;archived_href&quot;:&quot;&quot;,&quot;redirect_href&quot;:&quot;https:\/\/doi.org\/10.54105\/ijcns.B1432.04021124&quot;,&quot;checks&quot;:[],&quot;broken&quot;:false,&quot;last_checked&quot;:null,&quot;process&quot;:&quot;done&quot;},{&quot;id&quot;:50,&quot;href&quot;:&quot;https:\/\/www.openaccess.nl\/en\/open-publications&quot;,&quot;archived_href&quot;:&quot;http:\/\/web-wp.archive.org\/web\/20241228104058\/https:\/\/www.openaccess.nl\/en\/open-publications&quot;,&quot;redirect_href&quot;:&quot;&quot;,&quot;checks&quot;:[{&quot;date&quot;:&quot;2025-12-15 07:42:16&quot;,&quot;http_code&quot;:404},{&quot;date&quot;:&quot;2025-12-18 08:02:48&quot;,&quot;http_code&quot;:404},{&quot;date&quot;:&quot;2025-12-21 18:23:17&quot;,&quot;http_code&quot;:404},{&quot;date&quot;:&quot;2025-12-24 19:59:21&quot;,&quot;http_code&quot;:404},{&quot;date&quot;:&quot;2025-12-28 16:39:39&quot;,&quot;http_code&quot;:404},{&quot;date&quot;:&quot;2025-12-31 22:36:42&quot;,&quot;http_code&quot;:503},{&quot;date&quot;:&quot;2026-01-05 09:23:34&quot;,&quot;http_code&quot;:404},{&quot;date&quot;:&quot;2026-01-08 10:48:51&quot;,&quot;http_code&quot;:404},{&quot;date&quot;:&quot;2026-01-11 21:41:19&quot;,&quot;http_code&quot;:404},{&quot;date&quot;:&quot;2026-01-15 06:57:07&quot;,&quot;http_code&quot;:404},{&quot;date&quot;:&quot;2026-01-18 18:33:46&quot;,&quot;http_code&quot;:503},{&quot;date&quot;:&quot;2026-01-22 07:02:42&quot;,&quot;http_code&quot;:404},{&quot;date&quot;:&quot;2026-01-25 21:53:32&quot;,&quot;http_code&quot;:404},{&quot;date&quot;:&quot;2026-01-29 15:33:33&quot;,&quot;http_code&quot;:404},{&quot;date&quot;:&quot;2026-02-02 13:42:46&quot;,&quot;http_code&quot;:503},{&quot;date&quot;:&quot;2026-02-06 07:12:10&quot;,&quot;http_code&quot;:404},{&quot;date&quot;:&quot;2026-02-10 08:20:32&quot;,&quot;http_code&quot;:503},{&quot;date&quot;:&quot;2026-02-13 14:11:44&quot;,&quot;http_code&quot;:404},{&quot;date&quot;:&quot;2026-02-16 20:04:18&quot;,&quot;http_code&quot;:404},{&quot;date&quot;:&quot;2026-02-20 13:50:59&quot;,&quot;http_code&quot;:404},{&quot;date&quot;:&quot;2026-02-25 17:09:49&quot;,&quot;http_code&quot;:404},{&quot;date&quot;:&quot;2026-02-28 21:11:01&quot;,&quot;http_code&quot;:404},{&quot;date&quot;:&quot;2026-05-01 13:17:51&quot;,&quot;http_code&quot;:404}],&quot;broken&quot;:true,&quot;last_checked&quot;:{&quot;date&quot;:&quot;2026-05-01 13:17:51&quot;,&quot;http_code&quot;:404},&quot;process&quot;:&quot;done&quot;},{&quot;id&quot;:21,&quot;href&quot;:&quot;https:\/\/citation.crosscite.org&quot;,&quot;archived_href&quot;:&quot;http:\/\/web-wp.archive.org\/web\/20250115122456\/https:\/\/citation.crosscite.org:443\/&quot;,&quot;redirect_href&quot;:&quot;&quot;,&quot;checks&quot;:[{&quot;date&quot;:&quot;2025-12-15 07:33:16&quot;,&quot;http_code&quot;:200},{&quot;date&quot;:&quot;2025-12-20 14:22:24&quot;,&quot;http_code&quot;:200},{&quot;date&quot;:&quot;2025-12-23 14:26:51&quot;,&quot;http_code&quot;:200},{&quot;date&quot;:&quot;2025-12-27 09:31:15&quot;,&quot;http_code&quot;:200},{&quot;date&quot;:&quot;2025-12-30 23:02:26&quot;,&quot;http_code&quot;:503},{&quot;date&quot;:&quot;2026-01-05 12:39:31&quot;,&quot;http_code&quot;:200},{&quot;date&quot;:&quot;2026-01-08 20:31:32&quot;,&quot;http_code&quot;:200},{&quot;date&quot;:&quot;2026-01-14 10:29:11&quot;,&quot;http_code&quot;:200},{&quot;date&quot;:&quot;2026-01-19 12:09:28&quot;,&quot;http_code&quot;:200},{&quot;date&quot;:&quot;2026-01-23 00:28:53&quot;,&quot;http_code&quot;:200},{&quot;date&quot;:&quot;2026-01-28 08:03:59&quot;,&quot;http_code&quot;:200},{&quot;date&quot;:&quot;2026-01-31 20:11:59&quot;,&quot;http_code&quot;:200},{&quot;date&quot;:&quot;2026-02-04 10:55:53&quot;,&quot;http_code&quot;:200},{&quot;date&quot;:&quot;2026-02-10 08:20:31&quot;,&quot;http_code&quot;:200},{&quot;date&quot;:&quot;2026-02-13 14:11:45&quot;,&quot;http_code&quot;:200},{&quot;date&quot;:&quot;2026-02-16 15:03:16&quot;,&quot;http_code&quot;:200},{&quot;date&quot;:&quot;2026-02-20 07:11:28&quot;,&quot;http_code&quot;:200},{&quot;date&quot;:&quot;2026-02-24 01:25:48&quot;,&quot;http_code&quot;:200},{&quot;date&quot;:&quot;2026-02-27 10:39:17&quot;,&quot;http_code&quot;:200},{&quot;date&quot;:&quot;2026-03-03 03:22:09&quot;,&quot;http_code&quot;:200},{&quot;date&quot;:&quot;2026-05-01 13:17:52&quot;,&quot;http_code&quot;:200}],&quot;broken&quot;:false,&quot;last_checked&quot;:{&quot;date&quot;:&quot;2026-05-01 13:17:52&quot;,&quot;http_code&quot;:200},&quot;process&quot;:&quot;done&quot;},{&quot;id&quot;:55,&quot;href&quot;:&quot;https:\/\/zenodo.org\/records\/14227115&quot;,&quot;archived_href&quot;:&quot;http:\/\/web-wp.archive.org\/web\/20250429085540\/https:\/\/zenodo.org\/records\/14227115&quot;,&quot;redirect_href&quot;:&quot;&quot;,&quot;checks&quot;:[{&quot;date&quot;:&quot;2025-12-15 07:42:41&quot;,&quot;http_code&quot;:200},{&quot;date&quot;:&quot;2025-12-31 10:39:29&quot;,&quot;http_code&quot;:503},{&quot;date&quot;:&quot;2026-01-20 05:32:33&quot;,&quot;http_code&quot;:503}],&quot;broken&quot;:false,&quot;last_checked&quot;:{&quot;date&quot;:&quot;2026-01-20 05:32:33&quot;,&quot;http_code&quot;:503},&quot;process&quot;:&quot;done&quot;},{&quot;id&quot;:52,&quot;href&quot;:&quot;https:\/\/www.journals.latticescipub.com\/index.php\/ijcns\/issue\/view\/274&quot;,&quot;archived_href&quot;:&quot;http:\/\/web-wp.archive.org\/web\/20251215081011\/https:\/\/www.journals.latticescipub.com\/index.php\/ijcns\/issue\/view\/274&quot;,&quot;redirect_href&quot;:&quot;&quot;,&quot;checks&quot;:[{&quot;date&quot;:&quot;2025-12-15 17:02:56&quot;,&quot;http_code&quot;:200},{&quot;date&quot;:&quot;2025-12-22 09:59:53&quot;,&quot;http_code&quot;:200},{&quot;date&quot;:&quot;2025-12-31 10:39:28&quot;,&quot;http_code&quot;:200},{&quot;date&quot;:&quot;2026-01-09 04:25:37&quot;,&quot;http_code&quot;:200},{&quot;date&quot;:&quot;2026-01-16 17:46:25&quot;,&quot;http_code&quot;:200},{&quot;date&quot;:&quot;2026-01-20 05:32:29&quot;,&quot;http_code&quot;:200},{&quot;date&quot;:&quot;2026-01-29 15:33:33&quot;,&quot;http_code&quot;:200},{&quot;date&quot;:&quot;2026-02-12 20:27:53&quot;,&quot;http_code&quot;:200},{&quot;date&quot;:&quot;2026-02-16 21:05:04&quot;,&quot;http_code&quot;:200},{&quot;date&quot;:&quot;2026-02-21 05:08:35&quot;,&quot;http_code&quot;:200},{&quot;date&quot;:&quot;2026-02-25 17:09:40&quot;,&quot;http_code&quot;:200},{&quot;date&quot;:&quot;2026-03-01 08:25:25&quot;,&quot;http_code&quot;:200},{&quot;date&quot;:&quot;2026-05-01 13:17:51&quot;,&quot;http_code&quot;:200}],&quot;broken&quot;:false,&quot;last_checked&quot;:{&quot;date&quot;:&quot;2026-05-01 13:17:51&quot;,&quot;http_code&quot;:200},&quot;process&quot;:&quot;done&quot;},{&quot;id&quot;:24,&quot;href&quot;:&quot;http:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0&quot;,&quot;archived_href&quot;:&quot;http:\/\/web-wp.archive.org\/web\/20251214135420\/https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0\/&quot;,&quot;redirect_href&quot;:&quot;&quot;,&quot;checks&quot;:[{&quot;date&quot;:&quot;2025-12-15 07:33:23&quot;,&quot;http_code&quot;:206},{&quot;date&quot;:&quot;2025-12-20 14:22:24&quot;,&quot;http_code&quot;:200},{&quot;date&quot;:&quot;2025-12-23 14:26:49&quot;,&quot;http_code&quot;:206},{&quot;date&quot;:&quot;2025-12-27 09:31:15&quot;,&quot;http_code&quot;:206},{&quot;date&quot;:&quot;2025-12-30 23:02:17&quot;,&quot;http_code&quot;:206},{&quot;date&quot;:&quot;2026-01-05 12:39:33&quot;,&quot;http_code&quot;:206},{&quot;date&quot;:&quot;2026-01-08 20:31:32&quot;,&quot;http_code&quot;:206},{&quot;date&quot;:&quot;2026-01-14 10:29:11&quot;,&quot;http_code&quot;:206},{&quot;date&quot;:&quot;2026-01-19 12:09:28&quot;,&quot;http_code&quot;:206},{&quot;date&quot;:&quot;2026-01-23 00:28:53&quot;,&quot;http_code&quot;:206},{&quot;date&quot;:&quot;2026-01-28 08:04:01&quot;,&quot;http_code&quot;:206},{&quot;date&quot;:&quot;2026-01-31 20:11:59&quot;,&quot;http_code&quot;:206},{&quot;date&quot;:&quot;2026-02-04 10:55:51&quot;,&quot;http_code&quot;:206},{&quot;date&quot;:&quot;2026-02-10 08:20:31&quot;,&quot;http_code&quot;:206},{&quot;date&quot;:&quot;2026-02-13 14:11:44&quot;,&quot;http_code&quot;:206},{&quot;date&quot;:&quot;2026-02-16 15:03:15&quot;,&quot;http_code&quot;:206},{&quot;date&quot;:&quot;2026-02-20 07:11:27&quot;,&quot;http_code&quot;:206},{&quot;date&quot;:&quot;2026-02-24 01:25:48&quot;,&quot;http_code&quot;:206},{&quot;date&quot;:&quot;2026-02-27 10:39:18&quot;,&quot;http_code&quot;:206},{&quot;date&quot;:&quot;2026-03-03 03:22:09&quot;,&quot;http_code&quot;:206},{&quot;date&quot;:&quot;2026-05-01 13:17:51&quot;,&quot;http_code&quot;:206}],&quot;broken&quot;:false,&quot;last_checked&quot;:{&quot;date&quot;:&quot;2026-05-01 13:17:51&quot;,&quot;http_code&quot;:206},&quot;process&quot;:&quot;done&quot;}]'></div>
<div  class='flex_column av-5ceodj-54346ce48fe2df776a95ac5d45d8b3ae av_one_full  avia-builder-el-0  el_before_av_social_share  avia-builder-el-first  first flex_column_div  '     ><div  class='av_promobox av-m3wozud5-e5a88c4eb51a3a282f2b0f17439e2a02 avia-button-yes  avia-builder-el-1  avia-builder-el-no-sibling '><div class='avia-promocontent'></p>
<p style="text-align: justify;"><span style="font-family: 'times new roman', times, serif;"><span style="font-size: 14pt;"><strong><span style="font-size: 18pt;">An Analytical Approach to Understanding the Principles of Cryptography within the Kaṭapayādi System as Reflected in the Works of Nemicandra</span><a href="https://crossmark.crossref.org/dialog/?doi=10.54105/ijcns.B1432.04021124&amp;domain=https://www.ijcns.latticescipub.com"><img decoding="async" id="crossmark-icon" class="alignright" src="https://crossmark-cdn.crossref.org/widget/v2.0/logos/CROSSMARK_Color_horizontal.svg" alt="CROSSMARK Color horizontal" width="150" height="33"></a><br />
</strong>Prajna Jadhav</span></span></p>
<p style="text-align: justify;"><span style="font-size: 12pt;"><span style="font-family: 'times new roman', times, serif;"><span style="font-family: 'times new roman', times, serif;">
<style type="text/css" data-created_by="avia_inline_auto" id="style-css-av-4fvjvr-5974f8027c52f0c7439a7512d032d495">
.av_font_icon.av-4fvjvr-5974f8027c52f0c7439a7512d032d495{
color:#4392e8;
border-color:#4392e8;
}
.avia-svg-icon.av-4fvjvr-5974f8027c52f0c7439a7512d032d495 svg:first-child{
stroke:#4392e8;
fill:#4392e8;
}
.av_font_icon.av-4fvjvr-5974f8027c52f0c7439a7512d032d495 .av-icon-char{
font-size:20px;
line-height:20px;
}
</style>
<span  class='av_font_icon av-4fvjvr-5974f8027c52f0c7439a7512d032d495 avia_animate_when_visible av-icon-style- avia-icon-pos-left avia-iconfont avia-font-entypo-fontello avia-icon-animate'><span class='av-icon-char' data-av_icon='' data-av_iconfont='entypo-fontello' aria-hidden="true" data-avia-icon-tooltip="prajnajadhav07@gmail.com"></span></span>Prajna Jadhav, Ph. D. Student, Department of Chinese Language, Sanchi University of Buddhist-Indic Studies, (Madhya Pradesh), India. </span></span></span></p>
<p style="text-align: justify;"><span style="font-family: 'times new roman', times, serif; font-size: 12pt;">Manuscript received on 25 October 2024<strong> |</strong> Revised Manuscript received on 11 November 2024<strong> |</strong> Manuscript Accepted on 15 November 2024 <strong>|</strong> Manuscript published on 30 November 2024 <strong>|</strong> PP: 1-6 <strong>|</strong> Volume-4 Issue-2, November 2024 <strong>|</strong> Retrieval Number: 100.1/ijcns.B143204021124 <strong>|</strong> DOI: <a href="http://doi.org/10.54105/ijcns.B1432.04021124" target="_blank" rel="noopener">10.54105/ijcns.B1432.04021124</a></span></p>
<p style="text-align: justify;"><span style="font-size: 12pt;"> <span style="font-family: 'times new roman', times, serif;"><i class="fa fa-unlock-alt" style="color: blue;"></i><a href="https://www.openaccess.nl/en/open-publications" target="_blank" rel="noopener"> Open Access</a><strong> |</strong> <i class="far fa-file-alt" style="color: blue;"></i><a href="https://www.ijcns.latticescipub.com/ethics-policies/"> Ethics and Policies</a> | <i class="fa fa-quote-right" style="color: blue;"></i><a href="https://citation.crosscite.org/" target="_blank" rel="noopener"> Cite</a> <strong>|</strong> <i class="fa fa-plus" style="color: blue;" aria-hidden="true"></i><a href="https://zenodo.org/records/14227115" target="_blank" rel="noopener"> Zenodo</a> </span><span style="font-family: 'times new roman', times, serif;"><strong>|</strong> <i class="fa fa-plus" style="color: blue;" aria-hidden="true"></i><a href="https://www.journals.latticescipub.com/index.php/ijcns/issue/view/274"> OJS</a> <strong>|</strong> <i class="fa fa-database" style="color: blue;" aria-hidden="true"></i><a href="https://www.ijcns.latticescipub.com/indexing/"> Indexing and Abstracting</a></span></span><br />
<span style="font-family: 'times new roman', times, serif; font-size: 10pt;">© The Authors. Published by Lattice Science Publication (LSP). This is an <a href="https://www.openaccess.nl/en/open-publications" target="_blank" rel="noopener">open-access</a> article under the CC-BY-NC-ND license (<a href="http://creativecommons.org/licenses/by-nc-nd/4.0/" target="_blank" rel="noopener">http://creativecommons.org/licenses/by-nc-nd/4.0/</a>)</span></p>
<p style="text-align: justify;"><span style="font-size: 14pt;"><strong style="font-family: 'times new roman', times, serif;">Abstract:</strong><span style="font-family: times new roman, times, serif;"> The kaṭapayādi system is an alphabetic system of numeral notation developed in India. The purpose of this paper is to understand the ideas related to cryptography within the kaṭapayādi system, although this system was not developed to hide information. To do this, this paper studies the use of this system in the Gommaṭasāra-Jīvakāṇḍa and Trilokasāra of Nemicandra (981 CE) using an analytical approach. This paper finds that like the Caesar cipher and Vigenère cipher, the ciphertext in this system is also a substitution cipher, but unlike them, the letters of the Sanskrit alphabet substitute the digits of a number in it with no shift. This system provides multiple ways to encrypt a number. It has symmetric encryption. Correctness property is ensured in it. In it, the writer is the one who encrypts the number into ciphertext and the one who decrypts the ciphertext into number is the reader. The key in this system was not a public key, although it was publicly available.</span></span></p>
<p style="text-align: justify;"><span style="font-family: 'times new roman', times, serif; font-size: 12pt;"><span style="font-size: 14pt;"><strong>Keywords: </strong><span style="font-family: times new roman, times, serif;">Cryptographic Ideas, India, Kaṭapayādi System, Nemicandra.</span></span><br />
<span style="font-size: 14pt;"> <strong>Scope of the Article:</strong> Cryptographic Algorithms</span><br />
</span></p>
<p>
</div><div  class='avia-button-wrap av-m3wozud5-d01d66a1bb3d1e4d4cb3eda80b87b831-wrap avia-button-right '><a href="https://www.ijcns.latticescipub.com/wp-content/uploads/papers/v4i2/B143204021124.pdf" class="avia-button av-m3wozud5-d01d66a1bb3d1e4d4cb3eda80b87b831 av-link-btn avia-icon_select-yes-left-icon avia-size-medium avia-position-right avia-color-theme-color" aria-label="Download PDF"><span class='avia_button_icon avia_button_icon_left avia-iconfont avia-font-entypo-fontello' data-av_icon='' data-av_iconfont='entypo-fontello' ></span><span class='avia_iconbox_title' >Download PDF</span></a></div></div></div><div  class='av-social-sharing-box av-2yz6s7-2d24c3e4b3f88850ba54c4ee24ea7b8d av-social-sharing-box-default  avia-builder-el-3  el_after_av_one_full  avia-builder-el-last  av-social-sharing-box-fullwidth'><div class="av-share-box"><h5 class='av-share-link-description av-no-toc '>Share this entry</h5><ul class="av-share-box-list noLightbox"><li class='av-share-link av-social-link-facebook avia_social_iconfont' ><a target="_blank" aria-label="Share on Facebook" href="https://www.facebook.com/sharer.php?u=https://www.ijcns.latticescipub.com/portfolio-item/b143204021124/&#038;t=B143204021124" data-av_icon="" data-av_iconfont="entypo-fontello" title="" data-avia-related-tooltip="Share on Facebook"><span class='avia_hidden_link_text'>Share on Facebook</span></a></li><li class='av-share-link av-social-link-twitter avia_social_iconfont' ><a target="_blank" aria-label="Share on X" href="https://twitter.com/share?text=B143204021124&#038;url=https://www.ijcns.latticescipub.com/?p=1047" data-av_icon="" data-av_iconfont="entypo-fontello" title="" data-avia-related-tooltip="Share on X"><span class='avia_hidden_link_text'>Share on X</span></a></li><li class='av-share-link av-social-link-whatsapp avia_social_iconfont' ><a target="_blank" aria-label="Share on WhatsApp" href="https://api.whatsapp.com/send?text=https://www.ijcns.latticescipub.com/portfolio-item/b143204021124/" data-av_icon="" data-av_iconfont="entypo-fontello" title="" data-avia-related-tooltip="Share on WhatsApp"><span class='avia_hidden_link_text'>Share on WhatsApp</span></a></li><li class='av-share-link av-social-link-pinterest avia_social_iconfont' ><a target="_blank" aria-label="Share on Pinterest" href="https://pinterest.com/pin/create/button/?url=https%3A%2F%2Fwww.ijcns.latticescipub.com%2Fportfolio-item%2Fb143204021124%2F&#038;description=B143204021124&#038;media=" data-av_icon="" data-av_iconfont="entypo-fontello" title="" data-avia-related-tooltip="Share on Pinterest"><span class='avia_hidden_link_text'>Share on Pinterest</span></a></li><li class='av-share-link av-social-link-linkedin avia_social_iconfont' ><a target="_blank" aria-label="Share on LinkedIn" href="https://linkedin.com/shareArticle?mini=true&#038;title=B143204021124&#038;url=https://www.ijcns.latticescipub.com/portfolio-item/b143204021124/" data-av_icon="" data-av_iconfont="entypo-fontello" title="" data-avia-related-tooltip="Share on LinkedIn"><span class='avia_hidden_link_text'>Share on LinkedIn</span></a></li><li class='av-share-link av-social-link-tumblr avia_social_iconfont' ><a target="_blank" aria-label="Share on Tumblr" href="https://www.tumblr.com/share/link?url=https%3A%2F%2Fwww.ijcns.latticescipub.com%2Fportfolio-item%2Fb143204021124%2F&#038;name=B143204021124&#038;description=" data-av_icon="" data-av_iconfont="entypo-fontello" title="" data-avia-related-tooltip="Share on Tumblr"><span class='avia_hidden_link_text'>Share on Tumblr</span></a></li><li class='av-share-link av-social-link-vk avia_social_iconfont' ><a target="_blank" aria-label="Share on Vk" href="https://vk.com/share.php?url=https://www.ijcns.latticescipub.com/portfolio-item/b143204021124/" data-av_icon="" data-av_iconfont="entypo-fontello" title="" data-avia-related-tooltip="Share on Vk"><span class='avia_hidden_link_text'>Share on Vk</span></a></li><li class='av-share-link av-social-link-reddit avia_social_iconfont' ><a target="_blank" aria-label="Share on Reddit" href="https://reddit.com/submit?url=https://www.ijcns.latticescipub.com/portfolio-item/b143204021124/&#038;title=B143204021124" data-av_icon="" data-av_iconfont="entypo-fontello" title="" data-avia-related-tooltip="Share on Reddit"><span class='avia_hidden_link_text'>Share on Reddit</span></a></li><li class='av-share-link av-social-link-mail avia_social_iconfont' ><a  aria-label="Share by Mail" href='mailto:?subject=B143204021124&#038;body=https://www.ijcns.latticescipub.com/portfolio-item/b143204021124/' data-av_icon='' data-av_iconfont='entypo-fontello'  title='' data-avia-related-tooltip='Share by Mail'><span class='avia_hidden_link_text'>Share by Mail</span></a></li><li class='av-share-link av-social-link-yelp avia_social_iconfont' ><a target="_blank" aria-label="Visit us on Yelp" href="https://www.yelp.com" data-av_icon="" data-av_iconfont="entypo-fontello" title="" data-avia-related-tooltip="Visit us on Yelp" rel="noopener"><span class='avia_hidden_link_text'>Visit us on Yelp</span></a></li></ul></div></div></p>
<p>The post <a rel="nofollow" href="https://www.ijcns.latticescipub.com/portfolio-item/b143204021124/">B143204021124</a> appeared first on <a rel="nofollow" href="https://www.ijcns.latticescipub.com">Indian Journal of Cryptography and Network Security (IJCNS)</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>A142704010524</title>
		<link>https://www.ijcns.latticescipub.com/portfolio-item/a142704010524/</link>
		
		<dc:creator><![CDATA[IJCNS Journal]]></dc:creator>
		<pubDate>Mon, 25 Nov 2024 07:08:22 +0000</pubDate>
				<guid isPermaLink="false">https://www.ijcns.latticescipub.com/?post_type=portfolio&#038;p=1043</guid>

					<description><![CDATA[<p>The Indian Journal of Cryptography and Network Security (IJCNS) has ISSN 2582-9238 (online), an open-access, peer-reviewed, periodical half-yearly international journal, which is published by Lattice Science Publication (LSP) in May and November. The aim of the journal is to publish high quality peer–reviewed original articles in the area of Cryptography and Network Security that covers Cryptographic Protocols, Cryptography and Coding, Untrace-Ability, Privacy and Authentication, Key Management, Authentication, Trust Management, Quantum Cryptography, Computational Intelligence in Security, Artificial Immune Systems, Biological &amp; Evolutionary, Computation, Intelligent Agents and Systems, Reinforcement &amp; Unsupervised Learning, Autonomy-Oriented Computing, Coevolutionary Algorithms, Fuzzy Systems, Biometric Security, Trust Models and Metrics, Regulation and Trust Mechanisms, Data Integrity, Models for Authentication, Trust and Authorization, Wireless Network Security, Information Hiding, Data &amp; System Integrity, Access Control and Intrusion Detection, Intrusion Detection and Vulnerability Assessment, Authentication and Non-Repudiation, Identification and Authentication Insider Threats and Countermeasures, Intrusion Detection &amp; Prevention, Secure Cloud Computing, Security Information Systems Architecture and Design and Security Patterns, Security Management, Security Requirements (Threats, Vulnerabilities, Risk, Formal Methods, etc.), Sensor and Mobile ad hoc Network Security, Service and Systems Design and QOS Network Security, System Security, Intrusion Detection, Secure end Systems, Secure Operating Systems, Data Base Security, Security Infrastructures, Security Evaluation, Software Security, Security and Privacy in Mobile Systems, Security and Privacy in Pervasive/Ubiquitous Computing, Security and Privacy in Web Services, Security and Privacy Policies, Security Area Control, Security Deployment, Security Engineering, Security for Grid Computing, Security in Distributed Systems, Network Security, Internet Security, Firewalls, Mobile Security, Security Agents, Protocols, Anti-Virus and Anti-Hacker Measures, Content Protection, Software Protection, Tamper Resistant Software, Electronic Commerce, Electronic Government, Health, Telecommunications, Mobility, Foundations, Privacy, Access Control, Identification, Applied Cryptography and Formal Methods in Information Security.#Cryptographic Protocols #Cryptography and Coding #Untrace-Ability #Privacy and Authentication #Key Management #Authentication #Trust Management #Quantum Cryptography #Computational Intelligence in Security #Artificial Immune Systems #Biological &amp; Evolutionary Computation #Intelligent Agents and Systems #Reinforcement &amp; Unsupervised Learning #Autonomy-Oriented Computing #Coevolutionary Algorithms #Fuzzy Systems #Biometric Security #Trust Models and Metrics #Regulation and Trust Mechanisms #Data Integrity #Models for Authentication #Trust and Authorization #Wireless Network Security #Information Hiding #Data &amp; System Integrity #Access Control and Intrusion Detection #Intusion Detection and Vulnerability Assessment #Authentication and Non-Repudiation #Identification and Authentication #Insider Threats and Countermeasures #Intrusion Detection &amp; Prevention #Secure Cloud Computing #Security Information Systems Architecture and Design and Security Patterns #Security Management #Security Requirements (Threats, Vulnerabilities, Risk, Formal Methods, etc.) #Sensor and Mobile ad hoc Network Security #Service and Systems Design and QOS Network Security #System Security #Intrusion Detection #Secure end Systems #Secure Operating Systems #Data Base Security #Security Infrastructures #Security Evaluation #Software Security #Security and Privacy in Mobile Systems #Security and Privacy in Pervasive/Ubiquitous Computing #Security and Privacy in Web Services #Security and Privacy Policies #Security Area Control #Security Deployment #Security Engineering #Security for Grid Computing #Security in Distributed Systems #Network Security #Internet Security #Firewalls #Mobile Security #Security Agents #Protocols #Anti-Virus and Anti-Hacker Measures #Content Protection #Software Protection #Tamper Resistant Software #Electronic Commerce #Electronic Government #Health #Telecommunications #Mobility #Foundations #Privacy #Access Control #Authentication #Identification #Applied Cryptography #Formal Methods in Information Security #PhD ademic #Scopus #SCI #LatticeScience #Springer, #ScienceDirect #IEEE #Mendeley #Research #Scholarship #UGC #SSRN #LatticeScience #ESCI #Science #Journal #Conference #SSRN #PubLons #PhD #Academic #Scopus #SCI #LatticeScience #Springer, #ScienceDirect #IEEE #Mendeley #Research #Scholarship #UGC #SSRN #LatticeScience #ESCI #Science #Journal #Conference #SSRN #PubLons</p>
<p>The post <a rel="nofollow" href="https://www.ijcns.latticescipub.com/portfolio-item/a142704010524/">A142704010524</a> appeared first on <a rel="nofollow" href="https://www.ijcns.latticescipub.com">Indian Journal of Cryptography and Network Security (IJCNS)</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>The Indian Journal of Cryptography and Network Security (IJCNS) has ISSN 2582-9238 (online), an open-access, peer-reviewed, periodical half-yearly international journal, which is published by Lattice Science Publication (LSP) in May and November. The aim of the journal is to publish high quality peer–reviewed original articles in the area of Cryptography and Network Security that covers Cryptographic Protocols, Cryptography and Coding, Untrace-Ability, Privacy and Authentication, Key Management, Authentication, Trust Management, Quantum Cryptography, Computational Intelligence in Security, Artificial Immune Systems, Biological &amp; Evolutionary, Computation, Intelligent Agents and Systems, Reinforcement &amp; Unsupervised Learning, Autonomy-Oriented Computing, Coevolutionary Algorithms, Fuzzy Systems, Biometric Security, Trust Models and Metrics, Regulation and Trust Mechanisms, Data Integrity, Models for Authentication, Trust and Authorization, Wireless Network Security, Information Hiding, Data &amp; System Integrity, Access Control and Intrusion Detection, Intrusion Detection and Vulnerability Assessment, Authentication and Non-Repudiation, Identification and Authentication Insider Threats and Countermeasures, Intrusion Detection &amp; Prevention, Secure Cloud Computing, Security Information Systems Architecture and Design and Security Patterns, Security Management, Security Requirements (Threats, Vulnerabilities, Risk, Formal Methods, etc.), Sensor and Mobile ad hoc Network Security, Service and Systems Design and QOS Network Security, System Security, Intrusion Detection, Secure end Systems, Secure Operating Systems, Data Base Security, Security Infrastructures, Security Evaluation, Software Security, Security and Privacy in Mobile Systems, Security and Privacy in Pervasive/Ubiquitous Computing, Security and Privacy in Web Services, Security and Privacy Policies, Security Area Control, Security Deployment, Security Engineering, Security for Grid Computing, Security in Distributed Systems, Network Security, Internet Security, Firewalls, Mobile Security, Security Agents, Protocols, Anti-Virus and Anti-Hacker Measures, Content Protection, Software Protection, Tamper Resistant Software, Electronic Commerce, Electronic Government, Health, Telecommunications, Mobility, Foundations, Privacy, Access Control, Identification, Applied Cryptography and Formal Methods in Information Security.#Cryptographic Protocols #Cryptography and Coding #Untrace-Ability #Privacy and Authentication #Key Management #Authentication #Trust Management #Quantum Cryptography #Computational Intelligence in Security #Artificial Immune Systems #Biological &amp; Evolutionary Computation #Intelligent Agents and Systems #Reinforcement &amp; Unsupervised Learning #Autonomy-Oriented Computing #Coevolutionary Algorithms #Fuzzy Systems #Biometric Security #Trust Models and Metrics #Regulation and Trust Mechanisms #Data Integrity #Models for Authentication #Trust and Authorization #Wireless Network Security #Information Hiding #Data &amp; System Integrity #Access Control and Intrusion Detection #Intusion Detection and Vulnerability Assessment #Authentication and Non-Repudiation #Identification and Authentication #Insider Threats and Countermeasures #Intrusion Detection &amp; Prevention #Secure Cloud Computing #Security Information Systems Architecture and Design and Security Patterns #Security Management #Security Requirements (Threats, Vulnerabilities, Risk, Formal Methods, etc.) #Sensor and Mobile ad hoc Network Security #Service and Systems Design and QOS Network Security #System Security #Intrusion Detection #Secure end Systems #Secure Operating Systems #Data Base Security #Security Infrastructures #Security Evaluation #Software Security #Security and Privacy in Mobile Systems #Security and Privacy in Pervasive/Ubiquitous Computing #Security and Privacy in Web Services #Security and Privacy Policies #Security Area Control #Security Deployment #Security Engineering #Security for Grid Computing #Security in Distributed Systems #Network Security #Internet Security #Firewalls #Mobile Security #Security Agents #Protocols #Anti-Virus and Anti-Hacker Measures #Content Protection #Software Protection #Tamper Resistant Software #Electronic Commerce #Electronic Government #Health #Telecommunications #Mobility #Foundations #Privacy #Access Control #Authentication #Identification #Applied Cryptography #Formal Methods in Information Security #PhD ademic #Scopus #SCI #LatticeScience #Springer, #ScienceDirect #IEEE #Mendeley #Research #Scholarship #UGC #SSRN #LatticeScience #ESCI #Science #Journal #Conference #SSRN #PubLons #PhD #Academic #Scopus #SCI #LatticeScience #Springer, #ScienceDirect #IEEE #Mendeley #Research #Scholarship #UGC #SSRN #LatticeScience #ESCI #Science #Journal #Conference #SSRN #PubLons</p>
<div class='__iawmlf-post-loop-links' style='display:none;' data-iawmlf-post-links='[{&quot;id&quot;:56,&quot;href&quot;:&quot;https:\/\/crossmark.crossref.org\/dialog\/?doi=10.54105\/ijcns.A1427.04021124&amp;domain=https:\/\/www.ijcns.latticescipub.com&quot;,&quot;archived_href&quot;:&quot;&quot;,&quot;redirect_href&quot;:&quot;&quot;,&quot;checks&quot;:[],&quot;broken&quot;:false,&quot;last_checked&quot;:null,&quot;process&quot;:&quot;done&quot;},{&quot;id&quot;:57,&quot;href&quot;:&quot;http:\/\/doi.org\/10.54105\/ijcns.A1427.04021124&quot;,&quot;archived_href&quot;:&quot;&quot;,&quot;redirect_href&quot;:&quot;https:\/\/doi.org\/10.54105\/ijcns.A1427.04021124&quot;,&quot;checks&quot;:[],&quot;broken&quot;:false,&quot;last_checked&quot;:null,&quot;process&quot;:&quot;done&quot;},{&quot;id&quot;:50,&quot;href&quot;:&quot;https:\/\/www.openaccess.nl\/en\/open-publications&quot;,&quot;archived_href&quot;:&quot;http:\/\/web-wp.archive.org\/web\/20241228104058\/https:\/\/www.openaccess.nl\/en\/open-publications&quot;,&quot;redirect_href&quot;:&quot;&quot;,&quot;checks&quot;:[{&quot;date&quot;:&quot;2025-12-15 07:42:16&quot;,&quot;http_code&quot;:404},{&quot;date&quot;:&quot;2025-12-18 08:02:48&quot;,&quot;http_code&quot;:404},{&quot;date&quot;:&quot;2025-12-21 18:23:17&quot;,&quot;http_code&quot;:404},{&quot;date&quot;:&quot;2025-12-24 19:59:21&quot;,&quot;http_code&quot;:404},{&quot;date&quot;:&quot;2025-12-28 16:39:39&quot;,&quot;http_code&quot;:404},{&quot;date&quot;:&quot;2025-12-31 22:36:42&quot;,&quot;http_code&quot;:503},{&quot;date&quot;:&quot;2026-01-05 09:23:34&quot;,&quot;http_code&quot;:404},{&quot;date&quot;:&quot;2026-01-08 10:48:51&quot;,&quot;http_code&quot;:404},{&quot;date&quot;:&quot;2026-01-11 21:41:19&quot;,&quot;http_code&quot;:404},{&quot;date&quot;:&quot;2026-01-15 06:57:07&quot;,&quot;http_code&quot;:404},{&quot;date&quot;:&quot;2026-01-18 18:33:46&quot;,&quot;http_code&quot;:503},{&quot;date&quot;:&quot;2026-01-22 07:02:42&quot;,&quot;http_code&quot;:404},{&quot;date&quot;:&quot;2026-01-25 21:53:32&quot;,&quot;http_code&quot;:404},{&quot;date&quot;:&quot;2026-01-29 15:33:33&quot;,&quot;http_code&quot;:404},{&quot;date&quot;:&quot;2026-02-02 13:42:46&quot;,&quot;http_code&quot;:503},{&quot;date&quot;:&quot;2026-02-06 07:12:10&quot;,&quot;http_code&quot;:404},{&quot;date&quot;:&quot;2026-02-10 08:20:32&quot;,&quot;http_code&quot;:503},{&quot;date&quot;:&quot;2026-02-13 14:11:44&quot;,&quot;http_code&quot;:404},{&quot;date&quot;:&quot;2026-02-16 20:04:18&quot;,&quot;http_code&quot;:404},{&quot;date&quot;:&quot;2026-02-20 13:50:59&quot;,&quot;http_code&quot;:404},{&quot;date&quot;:&quot;2026-02-25 17:09:49&quot;,&quot;http_code&quot;:404},{&quot;date&quot;:&quot;2026-02-28 21:11:01&quot;,&quot;http_code&quot;:404},{&quot;date&quot;:&quot;2026-05-01 13:17:51&quot;,&quot;http_code&quot;:404}],&quot;broken&quot;:true,&quot;last_checked&quot;:{&quot;date&quot;:&quot;2026-05-01 13:17:51&quot;,&quot;http_code&quot;:404},&quot;process&quot;:&quot;done&quot;},{&quot;id&quot;:21,&quot;href&quot;:&quot;https:\/\/citation.crosscite.org&quot;,&quot;archived_href&quot;:&quot;http:\/\/web-wp.archive.org\/web\/20250115122456\/https:\/\/citation.crosscite.org:443\/&quot;,&quot;redirect_href&quot;:&quot;&quot;,&quot;checks&quot;:[{&quot;date&quot;:&quot;2025-12-15 07:33:16&quot;,&quot;http_code&quot;:200},{&quot;date&quot;:&quot;2025-12-20 14:22:24&quot;,&quot;http_code&quot;:200},{&quot;date&quot;:&quot;2025-12-23 14:26:51&quot;,&quot;http_code&quot;:200},{&quot;date&quot;:&quot;2025-12-27 09:31:15&quot;,&quot;http_code&quot;:200},{&quot;date&quot;:&quot;2025-12-30 23:02:26&quot;,&quot;http_code&quot;:503},{&quot;date&quot;:&quot;2026-01-05 12:39:31&quot;,&quot;http_code&quot;:200},{&quot;date&quot;:&quot;2026-01-08 20:31:32&quot;,&quot;http_code&quot;:200},{&quot;date&quot;:&quot;2026-01-14 10:29:11&quot;,&quot;http_code&quot;:200},{&quot;date&quot;:&quot;2026-01-19 12:09:28&quot;,&quot;http_code&quot;:200},{&quot;date&quot;:&quot;2026-01-23 00:28:53&quot;,&quot;http_code&quot;:200},{&quot;date&quot;:&quot;2026-01-28 08:03:59&quot;,&quot;http_code&quot;:200},{&quot;date&quot;:&quot;2026-01-31 20:11:59&quot;,&quot;http_code&quot;:200},{&quot;date&quot;:&quot;2026-02-04 10:55:53&quot;,&quot;http_code&quot;:200},{&quot;date&quot;:&quot;2026-02-10 08:20:31&quot;,&quot;http_code&quot;:200},{&quot;date&quot;:&quot;2026-02-13 14:11:45&quot;,&quot;http_code&quot;:200},{&quot;date&quot;:&quot;2026-02-16 15:03:16&quot;,&quot;http_code&quot;:200},{&quot;date&quot;:&quot;2026-02-20 07:11:28&quot;,&quot;http_code&quot;:200},{&quot;date&quot;:&quot;2026-02-24 01:25:48&quot;,&quot;http_code&quot;:200},{&quot;date&quot;:&quot;2026-02-27 10:39:17&quot;,&quot;http_code&quot;:200},{&quot;date&quot;:&quot;2026-03-03 03:22:09&quot;,&quot;http_code&quot;:200},{&quot;date&quot;:&quot;2026-05-01 13:17:52&quot;,&quot;http_code&quot;:200}],&quot;broken&quot;:false,&quot;last_checked&quot;:{&quot;date&quot;:&quot;2026-05-01 13:17:52&quot;,&quot;http_code&quot;:200},&quot;process&quot;:&quot;done&quot;},{&quot;id&quot;:58,&quot;href&quot;:&quot;https:\/\/zenodo.org\/records\/14227100&quot;,&quot;archived_href&quot;:&quot;http:\/\/web-wp.archive.org\/web\/20250429093208\/https:\/\/zenodo.org\/records\/14227100&quot;,&quot;redirect_href&quot;:&quot;&quot;,&quot;checks&quot;:[{&quot;date&quot;:&quot;2025-12-15 07:42:47&quot;,&quot;http_code&quot;:200},{&quot;date&quot;:&quot;2025-12-22 00:30:20&quot;,&quot;http_code&quot;:503},{&quot;date&quot;:&quot;2025-12-31 11:30:31&quot;,&quot;http_code&quot;:200},{&quot;date&quot;:&quot;2026-01-16 17:46:27&quot;,&quot;http_code&quot;:200},{&quot;date&quot;:&quot;2026-01-29 15:33:34&quot;,&quot;http_code&quot;:200},{&quot;date&quot;:&quot;2026-02-16 21:05:08&quot;,&quot;http_code&quot;:200},{&quot;date&quot;:&quot;2026-02-28 13:23:25&quot;,&quot;http_code&quot;:200},{&quot;date&quot;:&quot;2026-05-01 17:08:19&quot;,&quot;http_code&quot;:200}],&quot;broken&quot;:false,&quot;last_checked&quot;:{&quot;date&quot;:&quot;2026-05-01 17:08:19&quot;,&quot;http_code&quot;:200},&quot;process&quot;:&quot;done&quot;},{&quot;id&quot;:52,&quot;href&quot;:&quot;https:\/\/www.journals.latticescipub.com\/index.php\/ijcns\/issue\/view\/274&quot;,&quot;archived_href&quot;:&quot;http:\/\/web-wp.archive.org\/web\/20251215081011\/https:\/\/www.journals.latticescipub.com\/index.php\/ijcns\/issue\/view\/274&quot;,&quot;redirect_href&quot;:&quot;&quot;,&quot;checks&quot;:[{&quot;date&quot;:&quot;2025-12-15 17:02:56&quot;,&quot;http_code&quot;:200},{&quot;date&quot;:&quot;2025-12-22 09:59:53&quot;,&quot;http_code&quot;:200},{&quot;date&quot;:&quot;2025-12-31 10:39:28&quot;,&quot;http_code&quot;:200},{&quot;date&quot;:&quot;2026-01-09 04:25:37&quot;,&quot;http_code&quot;:200},{&quot;date&quot;:&quot;2026-01-16 17:46:25&quot;,&quot;http_code&quot;:200},{&quot;date&quot;:&quot;2026-01-20 05:32:29&quot;,&quot;http_code&quot;:200},{&quot;date&quot;:&quot;2026-01-29 15:33:33&quot;,&quot;http_code&quot;:200},{&quot;date&quot;:&quot;2026-02-12 20:27:53&quot;,&quot;http_code&quot;:200},{&quot;date&quot;:&quot;2026-02-16 21:05:04&quot;,&quot;http_code&quot;:200},{&quot;date&quot;:&quot;2026-02-21 05:08:35&quot;,&quot;http_code&quot;:200},{&quot;date&quot;:&quot;2026-02-25 17:09:40&quot;,&quot;http_code&quot;:200},{&quot;date&quot;:&quot;2026-03-01 08:25:25&quot;,&quot;http_code&quot;:200},{&quot;date&quot;:&quot;2026-05-01 13:17:51&quot;,&quot;http_code&quot;:200}],&quot;broken&quot;:false,&quot;last_checked&quot;:{&quot;date&quot;:&quot;2026-05-01 13:17:51&quot;,&quot;http_code&quot;:200},&quot;process&quot;:&quot;done&quot;},{&quot;id&quot;:24,&quot;href&quot;:&quot;http:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0&quot;,&quot;archived_href&quot;:&quot;http:\/\/web-wp.archive.org\/web\/20251214135420\/https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0\/&quot;,&quot;redirect_href&quot;:&quot;&quot;,&quot;checks&quot;:[{&quot;date&quot;:&quot;2025-12-15 07:33:23&quot;,&quot;http_code&quot;:206},{&quot;date&quot;:&quot;2025-12-20 14:22:24&quot;,&quot;http_code&quot;:200},{&quot;date&quot;:&quot;2025-12-23 14:26:49&quot;,&quot;http_code&quot;:206},{&quot;date&quot;:&quot;2025-12-27 09:31:15&quot;,&quot;http_code&quot;:206},{&quot;date&quot;:&quot;2025-12-30 23:02:17&quot;,&quot;http_code&quot;:206},{&quot;date&quot;:&quot;2026-01-05 12:39:33&quot;,&quot;http_code&quot;:206},{&quot;date&quot;:&quot;2026-01-08 20:31:32&quot;,&quot;http_code&quot;:206},{&quot;date&quot;:&quot;2026-01-14 10:29:11&quot;,&quot;http_code&quot;:206},{&quot;date&quot;:&quot;2026-01-19 12:09:28&quot;,&quot;http_code&quot;:206},{&quot;date&quot;:&quot;2026-01-23 00:28:53&quot;,&quot;http_code&quot;:206},{&quot;date&quot;:&quot;2026-01-28 08:04:01&quot;,&quot;http_code&quot;:206},{&quot;date&quot;:&quot;2026-01-31 20:11:59&quot;,&quot;http_code&quot;:206},{&quot;date&quot;:&quot;2026-02-04 10:55:51&quot;,&quot;http_code&quot;:206},{&quot;date&quot;:&quot;2026-02-10 08:20:31&quot;,&quot;http_code&quot;:206},{&quot;date&quot;:&quot;2026-02-13 14:11:44&quot;,&quot;http_code&quot;:206},{&quot;date&quot;:&quot;2026-02-16 15:03:15&quot;,&quot;http_code&quot;:206},{&quot;date&quot;:&quot;2026-02-20 07:11:27&quot;,&quot;http_code&quot;:206},{&quot;date&quot;:&quot;2026-02-24 01:25:48&quot;,&quot;http_code&quot;:206},{&quot;date&quot;:&quot;2026-02-27 10:39:18&quot;,&quot;http_code&quot;:206},{&quot;date&quot;:&quot;2026-03-03 03:22:09&quot;,&quot;http_code&quot;:206},{&quot;date&quot;:&quot;2026-05-01 13:17:51&quot;,&quot;http_code&quot;:206}],&quot;broken&quot;:false,&quot;last_checked&quot;:{&quot;date&quot;:&quot;2026-05-01 13:17:51&quot;,&quot;http_code&quot;:206},&quot;process&quot;:&quot;done&quot;}]'></div>
<div  class='flex_column av-3mhlgj-a6d56a79690c8e40d19eaaa8fbb3fda9 av_one_full  avia-builder-el-0  el_before_av_social_share  avia-builder-el-first  first flex_column_div  '     ><div  class='av_promobox av-m3wos3ik-db0f39c9dc7d990b1132b303c38fa21c avia-button-yes  avia-builder-el-1  avia-builder-el-no-sibling '><div class='avia-promocontent'></p>
<p style="text-align: justify;"><span style="font-family: 'times new roman', times, serif;"><span style="font-size: 14pt;"><strong><span style="font-size: 18pt;">A Comprehensive Methodology for Data Compression and Decompression Utilizing Huffman Coding, LZW Compression, and Run-Length Encoding, Integrated with Data Encryption Standard (DES) and Advanced Encryption Standard (AES) for Enhanced Security</span><a href="https://crossmark.crossref.org/dialog/?doi=10.54105/ijcns.A1427.04021124&amp;domain=https://www.ijcns.latticescipub.com"><img decoding="async" id="crossmark-icon" class="alignright" src="https://crossmark-cdn.crossref.org/widget/v2.0/logos/CROSSMARK_Color_horizontal.svg" alt="CROSSMARK Color horizontal" width="150" height="33"></a><br />
</strong>Sangeen Khan</span></span></p>
<p style="text-align: justify;"><span style="font-size: 12pt;"><span style="font-family: 'times new roman', times, serif;"><span style="font-family: 'times new roman', times, serif;">
<style type="text/css" data-created_by="avia_inline_auto" id="style-css-av-lmnwx-78ed7392bdedf94fb82df29c493a34e8">
.av_font_icon.av-lmnwx-78ed7392bdedf94fb82df29c493a34e8{
color:#4392e8;
border-color:#4392e8;
}
.avia-svg-icon.av-lmnwx-78ed7392bdedf94fb82df29c493a34e8 svg:first-child{
stroke:#4392e8;
fill:#4392e8;
}
.av_font_icon.av-lmnwx-78ed7392bdedf94fb82df29c493a34e8 .av-icon-char{
font-size:20px;
line-height:20px;
}
</style>
<span  class='av_font_icon av-lmnwx-78ed7392bdedf94fb82df29c493a34e8 avia_animate_when_visible av-icon-style- avia-icon-pos-left avia-iconfont avia-font-entypo-fontello avia-icon-animate'><span class='av-icon-char' data-av_icon='' data-av_iconfont='entypo-fontello' aria-hidden="true" data-avia-icon-tooltip="Sangeenkhan2662@gmail.com"></span></span>Sangeen Khan, Department of Communication Engineering University of Science and Technology Beijing China. </span></span></span></p>
<p style="text-align: justify;"><span style="font-family: 'times new roman', times, serif; font-size: 12pt;">Manuscript received on 20 February 2024 <strong>|</strong> Revised Manuscript received on 24 October 2024 <strong>|</strong> Manuscript Accepted on 15 November 2024<strong> |</strong> Manuscript published on 30 November 2024 <strong>|</strong> PP: 7-13 <strong>|</strong> Volume-4 Issue-2, November 2024 <strong>|</strong> Retrieval Number: 100.1/ijcns.A142704010524 <strong>|</strong> DOI: <a href="http://doi.org/10.54105/ijcns.A1427.04021124" target="_blank" rel="noopener">10.54105/ijcns.A1427.04021124</a></span></p>
<p style="text-align: justify;"><span style="font-size: 12pt;"> <span style="font-family: 'times new roman', times, serif;"><i class="fa fa-unlock-alt" style="color: blue;"></i><a href="https://www.openaccess.nl/en/open-publications" target="_blank" rel="noopener"> Open Access</a><strong> |</strong> <i class="far fa-file-alt" style="color: blue;"></i><a href="https://www.ijcns.latticescipub.com/ethics-policies/"> Ethics and Policies</a> | <i class="fa fa-quote-right" style="color: blue;"></i><a href="https://citation.crosscite.org/" target="_blank" rel="noopener"> Cite</a> <strong>|</strong> <i class="fa fa-plus" style="color: blue;" aria-hidden="true"></i><a href="https://zenodo.org/records/14227100" target="_blank" rel="noopener"> Zenodo</a> </span><span style="font-family: 'times new roman', times, serif;"><strong>|</strong> <i class="fa fa-plus" style="color: blue;" aria-hidden="true"></i><a href="https://www.journals.latticescipub.com/index.php/ijcns/issue/view/274"> OJS</a> <strong>|</strong> <i class="fa fa-database" style="color: blue;" aria-hidden="true"></i><a href="https://www.ijcns.latticescipub.com/indexing/"> Indexing and Abstracting</a></span></span><br />
<span style="font-family: 'times new roman', times, serif; font-size: 10pt;">© The Authors. Published by Lattice Science Publication (LSP). This is an <a href="https://www.openaccess.nl/en/open-publications" target="_blank" rel="noopener">open-access</a> article under the CC-BY-NC-ND license (<a href="http://creativecommons.org/licenses/by-nc-nd/4.0/" target="_blank" rel="noopener">http://creativecommons.org/licenses/by-nc-nd/4.0/</a>)</span></p>
<p style="text-align: justify;"><span style="font-size: 14pt;"><strong style="font-family: 'times new roman', times, serif;">Abstract:</strong><span style="font-family: times new roman, times, serif;"> With advancements in communication technologies, transitioning from 5G to 6G systems has led to exponential data growth, requiring secure and efficient data transmission solutions. This study integrates data compression techniques-Huffman Coding, Lempel-Ziv-Welch (LZW), and Run-Length Encoding (RLE)-with symmetric encryption algorithms, AES (Advanced Encryption Standard) and DES (Data Encryption Standard). The primary goal is to enhance computational performance while ensuring data security. Using a 32-byte dataset and implementing the algorithms in Go language via Visual Studio IDE, results demonstrate the significant reduction in encryption time when combining compression and encryption. Among the AES combinations, AES with Huffman Coding showed the highest efficiency, reducing encryption time by approximately 15% compared to standalone AES. Similarly, DES paired with LZW compression achieved a 20% improvement in computational time over standalone DES. The findings emphasize that selecting the optimal combination depends on data type and user requirements, facilitating secure and efficient communication in high-bandwidth, low-latency 6G systems. This research underscores the potential of cryptography, combined with compression, to enhance data transmission efficiency without compromising security. The integration approach highlights cryptographic strength in safeguarding big data, addressing challenges in modern technologies like the Internet of Everything (IoE). These results establish a foundation for future secure communication frameworks, promoting reliable and scalable cryptographic solutions tailored for 6G and beyond.</span></span></p>
<p style="text-align: justify;"><span style="font-family: 'times new roman', times, serif; font-size: 12pt;"><span style="font-size: 14pt;"><strong>Keywords: </strong><span style="font-family: times new roman, times, serif;">6G, AES, Go Language, Computational Performance, Big data.</span></span><br />
<span style="font-size: 14pt;"> <strong>Scope of the Article:</strong> Cryptographic Algorithms</span><br />
</span></p>
<p>
</div><div  class='avia-button-wrap av-m3wos3ik-e01aad367a21348b6530af67a83f930d-wrap avia-button-right '><a href="https://www.ijcns.latticescipub.com/wp-content/uploads/papers/v4i2/A142704010524.pdf" class="avia-button av-m3wos3ik-e01aad367a21348b6530af67a83f930d av-link-btn avia-icon_select-yes-left-icon avia-size-medium avia-position-right avia-color-theme-color" aria-label="Download PDF"><span class='avia_button_icon avia_button_icon_left avia-iconfont avia-font-entypo-fontello' data-av_icon='' data-av_iconfont='entypo-fontello' ></span><span class='avia_iconbox_title' >Download PDF</span></a></div></div></div><div  class='av-social-sharing-box av-2b028z-8223a3f77c2ec77ea9af41ddfded2961 av-social-sharing-box-default  avia-builder-el-3  el_after_av_one_full  avia-builder-el-last  av-social-sharing-box-fullwidth'><div class="av-share-box"><h5 class='av-share-link-description av-no-toc '>Share this entry</h5><ul class="av-share-box-list noLightbox"><li class='av-share-link av-social-link-facebook avia_social_iconfont' ><a target="_blank" aria-label="Share on Facebook" href="https://www.facebook.com/sharer.php?u=https://www.ijcns.latticescipub.com/portfolio-item/a142704010524/&#038;t=A142704010524" data-av_icon="" data-av_iconfont="entypo-fontello" title="" data-avia-related-tooltip="Share on Facebook"><span class='avia_hidden_link_text'>Share on Facebook</span></a></li><li class='av-share-link av-social-link-twitter avia_social_iconfont' ><a target="_blank" aria-label="Share on X" href="https://twitter.com/share?text=A142704010524&#038;url=https://www.ijcns.latticescipub.com/?p=1043" data-av_icon="" data-av_iconfont="entypo-fontello" title="" data-avia-related-tooltip="Share on X"><span class='avia_hidden_link_text'>Share on X</span></a></li><li class='av-share-link av-social-link-whatsapp avia_social_iconfont' ><a target="_blank" aria-label="Share on WhatsApp" href="https://api.whatsapp.com/send?text=https://www.ijcns.latticescipub.com/portfolio-item/a142704010524/" data-av_icon="" data-av_iconfont="entypo-fontello" title="" data-avia-related-tooltip="Share on WhatsApp"><span class='avia_hidden_link_text'>Share on WhatsApp</span></a></li><li class='av-share-link av-social-link-pinterest avia_social_iconfont' ><a target="_blank" aria-label="Share on Pinterest" href="https://pinterest.com/pin/create/button/?url=https%3A%2F%2Fwww.ijcns.latticescipub.com%2Fportfolio-item%2Fa142704010524%2F&#038;description=A142704010524&#038;media=" data-av_icon="" data-av_iconfont="entypo-fontello" title="" data-avia-related-tooltip="Share on Pinterest"><span class='avia_hidden_link_text'>Share on Pinterest</span></a></li><li class='av-share-link av-social-link-linkedin avia_social_iconfont' ><a target="_blank" aria-label="Share on LinkedIn" href="https://linkedin.com/shareArticle?mini=true&#038;title=A142704010524&#038;url=https://www.ijcns.latticescipub.com/portfolio-item/a142704010524/" data-av_icon="" data-av_iconfont="entypo-fontello" title="" data-avia-related-tooltip="Share on LinkedIn"><span class='avia_hidden_link_text'>Share on LinkedIn</span></a></li><li class='av-share-link av-social-link-tumblr avia_social_iconfont' ><a target="_blank" aria-label="Share on Tumblr" href="https://www.tumblr.com/share/link?url=https%3A%2F%2Fwww.ijcns.latticescipub.com%2Fportfolio-item%2Fa142704010524%2F&#038;name=A142704010524&#038;description=" data-av_icon="" data-av_iconfont="entypo-fontello" title="" data-avia-related-tooltip="Share on Tumblr"><span class='avia_hidden_link_text'>Share on Tumblr</span></a></li><li class='av-share-link av-social-link-vk avia_social_iconfont' ><a target="_blank" aria-label="Share on Vk" href="https://vk.com/share.php?url=https://www.ijcns.latticescipub.com/portfolio-item/a142704010524/" data-av_icon="" data-av_iconfont="entypo-fontello" title="" data-avia-related-tooltip="Share on Vk"><span class='avia_hidden_link_text'>Share on Vk</span></a></li><li class='av-share-link av-social-link-reddit avia_social_iconfont' ><a target="_blank" aria-label="Share on Reddit" href="https://reddit.com/submit?url=https://www.ijcns.latticescipub.com/portfolio-item/a142704010524/&#038;title=A142704010524" data-av_icon="" data-av_iconfont="entypo-fontello" title="" data-avia-related-tooltip="Share on Reddit"><span class='avia_hidden_link_text'>Share on Reddit</span></a></li><li class='av-share-link av-social-link-mail avia_social_iconfont' ><a  aria-label="Share by Mail" href='mailto:?subject=A142704010524&#038;body=https://www.ijcns.latticescipub.com/portfolio-item/a142704010524/' data-av_icon='' data-av_iconfont='entypo-fontello'  title='' data-avia-related-tooltip='Share by Mail'><span class='avia_hidden_link_text'>Share by Mail</span></a></li><li class='av-share-link av-social-link-yelp avia_social_iconfont' ><a target="_blank" aria-label="Visit us on Yelp" href="https://www.yelp.com" data-av_icon="" data-av_iconfont="entypo-fontello" title="" data-avia-related-tooltip="Visit us on Yelp" rel="noopener"><span class='avia_hidden_link_text'>Visit us on Yelp</span></a></li></ul></div></div></p>
<p>The post <a rel="nofollow" href="https://www.ijcns.latticescipub.com/portfolio-item/a142704010524/">A142704010524</a> appeared first on <a rel="nofollow" href="https://www.ijcns.latticescipub.com">Indian Journal of Cryptography and Network Security (IJCNS)</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
