Secure data transmission through fractal-based cryptosystem: a Noor iteration approach

Abstract The data must be protected from cyber-attacks that benefit from the weaknesses of the databases. Our traditional techniques are unstable. They are not strong enough to withstand the sophisticated and advanced criminal methods that attackers are developing and using to access confidential in...

Full description

Saved in:
Bibliographic Details
Main Authors: Deepak Negi, Rajiv Kumar, Vijay Kumar, Arvind Dhaka
Format: Article
Language:English
Published: Nature Portfolio 2025-07-01
Series:Scientific Reports
Subjects:
Online Access:https://doi.org/10.1038/s41598-025-04700-2
Tags: Add Tag
No Tags, Be the first to tag this record!