Olaiya et al., 2024 - Google Patents

Encryption techniques for financial data security in fintech applications

Olaiya et al., 2024

View PDF
Document ID
14204167810374561831
Author
Olaiya O
Adesoga T
Adebayo A
Sotomi F
Adigun O
Ezeliora P
Publication year
Publication venue
International Journal of Science and Research Archive

External Links

Snippet

In the dynamic world of financial technology (Fintech), securing financial data is a key priority. Increasing digital connectivity, adoption of cloud-based services requiring complex measures to protect the integrity, privacy and availability of sensitive information. Encryption …
Continue reading at www.researchgate.net (PDF) (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0485Networking architectures for enhanced packet encryption processing, e.g. offloading of IPsec packet processing or efficient security association look-up
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • H04L9/0827Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) involving distinctive intermediate devices or communication paths
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0435Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/16Implementing security features at a particular protocol layer
    • H04L63/164Implementing security features at a particular protocol layer at the network layer

Similar Documents

Publication Publication Date Title
Bhardwaj et al. Security algorithms for cloud computing
Deshpande et al. Enhancing Cloud Security: A Deep Cryptographic Analysis
Sheik et al. Secure authentication schemes in cloud computing with glimpse of artificial neural networks: A review
Sugumaran et al. An architecture for data security in cloud computing
Olaiya et al. Encryption techniques for financial data security in fintech applications
Kaleem et al. New Efficient Cryptographic Techniques For Cloud Computing Security
Pavani et al. Data Security and Privacy Issues in Cloud Environment
Sen et al. Find out the innovative techniques of data sharing using cryptography by systematic literature review
Salim et al. Design and implementation of a secure mobile banking system based on elliptic curve integrated encryption schema
Mondal et al. A Systematic Literature Survey on Data Security Techniques in a Cloud Environment
Shakor et al. Hybrid security model for medical image protection in cloud
Kankal et al. An adaptive authentication based on blockchain for bigdata hadoop framework
Caytiles et al. ECC based authentication scheme for securing data contents over open wireless network systems
Guziur et al. Light blockchain communication protocol for secure data transfer integrity
Téllez et al. Security in mobile payment systems
US11962691B1 (en) Systems, methods, and media for generating and using a multi-signature token for electronic communication validation
JP2014220668A (en) Transmission side device and reception side device
Shoukat Secure Cloud Based IoT Data Storage
Gupta et al. SeCrypt: A Password Manager
KARUPPASAMY Secure framework to enhance security using hybrid algorithm in cloud computing with ssl
Ajay et al. Security of Web Applications with short web service: a review Study
Singh et al. Enhancing the Security of JSON Web Token Using Signal Protocol and Ratchet System
Krishnaveni et al. Original Research Article A hybrid framework to enhance cloud security for storing and retrieving confidential data in clouds
Qureshi et al. Encryption Techniques for Smart Systems Data Security Offloaded to the Cloud. Symmetry 2022, 14, 695
Khan et al. In-Depth Analysis of Cryptographic Algorithms for Cloud-Database Security