An End-To-End Encrypted Real-Time Multimedia Messaging Service System for Unicast and Multicast Communication

Abstract Communication is as old as mankind and is extremely vital to human survival. As time passed, humanity evolved, so did our tools and technologies. Now, in this fast-paced world, we live in, information must be transmitted securely, as fast as possible, and without transmission delays; hence the advent of real-time communication. However, security breaches

A Review of Open Source fully homophobic Encryption Libraries: Zama.ai Concrete Compiler, Applications and Vulnerability

Abstract Fully Homomorphic Encryption (FHE) represents a sophisticated cryptographic method that permits computations on encrypted data without the necessity for prior decryption. Substantial progress has been achieved in the realm of FHE and its application since 2015, yielding enhanced efficacy, heightened security, and augmented feasibility. The review paper critically evaluates diverse FHE schemes/libraries, and the

A Hybrid Cryptographic Algorithm for Web Security against Distributed Denial of Service Attacks

Abstract To prevent disruptions on the internet caused by distributed denial of service (DDoS), the study presents a hybrid cryptographic algorithm that enhances web security. To enhance security and mitigate the effects of DDoS attacks, the proposed algorithm combines symmetric and asymmetric encryption techniques with traffic analysis. First, Blowfish encryption is employed in the fast

Phishing Uniform Resource Locator Detection Using Machine Learning Methods

Abstract Phishing attacks are a serious threat to internet security because they can cause large financial losses and jeopardize user privacy. To overcome these obstacles, this research uses machine learning models to create an effective phishing URL detection system. The research includes an in-depth examination of different phishing tactics, the complexity of phishing websites, and

Modelling Cybersecurity Knowledge and Attitudes of Online Users

Abstract: Individuals and organizations are persistently being exploited by cybercriminals. With the increased dependence on the Internet, cyberattacks have become even more prominent. However, many of the Internet users under prioritize their online safety, and fall victims. Their unawareness and negligence of cybersecurity poses devastating consequences. It is thus essential to analyze the factors affecting

Human Factors influencing Compliance to Cyber Security Practices by Employees of Public Universities in Southeast Nigeria

Abstract: The increasing use of technology in workplaces has led to a rise in cyber threats, making it essential for employees to have adequate knowledge and skills to ensure cyber safety. The study examined the human factors that influence the cyber security practices of employees in public universities in Southeast in Nigeria. The theory of