A new digital signature scheme based on Matrices Discrete Logarithm Problem (MDLP) and generalized Fibonacci or Multinacci matrices is proposed. The security of the scheme is based on the difficulty of solving the Discrete Logarithm Problem (DLP) in matrices. MDLP is a new one-way function based on matrices that provides the same security as the DLP. The use of matrices increases the complexity of the scheme, as it involves matrix exponentiation rather than integers. In the proposed scheme, the signer uses a Multinacci matrix Fkn to generate the signature and an inverse Multinacci matrix Fn-k to verify it. The computational complexity and security of the scheme are also discussed.
Planning an itinerary for travelling can be tedious, time-consuming, and challenging. This is especially true for tourists who have limited time budgets and are unfamiliar with a wide range of Points-of-Interest (POIs) in a city. To address this challenge, this paper proposes an Adaptive Genetic Algorithm (AGA) for personalized itinerary planning. This approach considers travelers' preferences, such as mandatory POIs, total number of POIs, POI popularity, POI cost, and POI rating. It views the itinerary planning problem as a multi-objective optimization problem and proposes an Adaptive Genetic Algorithm (AGA) to solve this problem. The results show that the AGAM algorithm is a promising approach for personalized itinerary planning. It is able to find itineraries that meet the traveler's preferences that are efficient in terms of time, cost, and overall rating.
This review presents the integration of security analysis with Quality of Service (QoS) support in the Routing Protocol for Low power and Lossy networks (RPL). This study highlights the importance of the security and QoS. A methodology for security analysis and evaluation of QoS support was proposed. An algorithm for integrating security analysis and QoS support in RPL is presented, addressing the vulnerability assessment and dynamic adaptation of route selection. This review highlights the significance of research on enhancing security and QoS support in RPL and its potential to contribute to the field of low-power and lossy networks.
Cybercrime is a type of crime that steals information from an owner and uses it for criminal purposes. There are other types of theft related to this crime, including identity theft, data theft, and deep fakes. This study provides a detailed analysis of cybercrime. The world has become more advanced in communication, especially after the invention of the internet, which provides a feasible environment for online dealings such as e-shopping, internet banking, and online payments. Although progress has been made to enhance innovation and development, there is a high risk of cybercrime worldwide. It has had a significant impact on digital platforms, adding both positives and negatives to global networking systems. Internet technology has been used by a few people for criminal activities, such as unauthorized access to networks and scams. These criminal activities or offences related to the internet, referred to as cybercrimes, are discussed in this paper.
Cybercrime is mainly related to online fraud and encompasses various criminal activities through computers and online platforms, posing significant challenges in today's technologically advanced world. The case study presented herein investigates the use of unsolicited mass email messages as a prominent method employed by cybercriminals. These messages, disseminated via instant messaging, text messaging, or other digital messaging systems, serve as a deceptive means to defraud unsuspecting individuals. This study aims to enhance our understanding of the techniques, motives, and impact of online fraud. Furthermore, it highlights the attractiveness of online fraud to advertisers, who exploit its low operating costs beyond managing mailing lists. This aspect underscores the complex interplay between cybercriminals, their targets, and the broader digital ecosystem where illicit activities intertwine with legitimate platforms. By delving into the realm of cybercrime, this case study serves as a valuable resource for researchers and individuals seeking to understand the evolving nature of cyber threats. It emphasizes the importance of heightened awareness, robust cybersecurity measures, and the need for continuous adaptation to mitigate the risks posed by cybercriminals in an interconnected world.