Olaiya et al., 2024 - Google Patents
Encryption techniques for financial data security in fintech applicationsOlaiya et al., 2024
View PDF- Document ID
- 14204167810374561831
- Author
- Olaiya O
- Adesoga T
- Adebayo A
- Sotomi F
- Adigun O
- Ezeliora P
- Publication year
- Publication venue
- International Journal of Science and Research Archive
External Links
Snippet
In the dynamic world of financial technology (Fintech), securing financial data is a key priority. Increasing digital connectivity, adoption of cloud-based services requiring complex measures to protect the integrity, privacy and availability of sensitive information. Encryption …
- 238000000034 method 0 title abstract description 49
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0485—Networking architectures for enhanced packet encryption processing, e.g. offloading of IPsec packet processing or efficient security association look-up
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
- H04L9/0827—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) involving distinctive intermediate devices or communication paths
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0435—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/16—Implementing security features at a particular protocol layer
- H04L63/164—Implementing security features at a particular protocol layer at the network layer
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Bhardwaj et al. | Security algorithms for cloud computing | |
Deshpande et al. | Enhancing Cloud Security: A Deep Cryptographic Analysis | |
Sheik et al. | Secure authentication schemes in cloud computing with glimpse of artificial neural networks: A review | |
Sugumaran et al. | An architecture for data security in cloud computing | |
Olaiya et al. | Encryption techniques for financial data security in fintech applications | |
Kaleem et al. | New Efficient Cryptographic Techniques For Cloud Computing Security | |
Pavani et al. | Data Security and Privacy Issues in Cloud Environment | |
Sen et al. | Find out the innovative techniques of data sharing using cryptography by systematic literature review | |
Salim et al. | Design and implementation of a secure mobile banking system based on elliptic curve integrated encryption schema | |
Mondal et al. | A Systematic Literature Survey on Data Security Techniques in a Cloud Environment | |
Shakor et al. | Hybrid security model for medical image protection in cloud | |
Kankal et al. | An adaptive authentication based on blockchain for bigdata hadoop framework | |
Caytiles et al. | ECC based authentication scheme for securing data contents over open wireless network systems | |
Guziur et al. | Light blockchain communication protocol for secure data transfer integrity | |
Téllez et al. | Security in mobile payment systems | |
US11962691B1 (en) | Systems, methods, and media for generating and using a multi-signature token for electronic communication validation | |
JP2014220668A (en) | Transmission side device and reception side device | |
Shoukat | Secure Cloud Based IoT Data Storage | |
Gupta et al. | SeCrypt: A Password Manager | |
KARUPPASAMY | Secure framework to enhance security using hybrid algorithm in cloud computing with ssl | |
Ajay et al. | Security of Web Applications with short web service: a review Study | |
Singh et al. | Enhancing the Security of JSON Web Token Using Signal Protocol and Ratchet System | |
Krishnaveni et al. | Original Research Article A hybrid framework to enhance cloud security for storing and retrieving confidential data in clouds | |
Qureshi et al. | Encryption Techniques for Smart Systems Data Security Offloaded to the Cloud. Symmetry 2022, 14, 695 | |
Khan et al. | In-Depth Analysis of Cryptographic Algorithms for Cloud-Database Security |