{"id":11803,"date":"2025-04-08T17:14:35","date_gmt":"2025-04-08T16:14:35","guid":{"rendered":"https:\/\/icertpublication.com\/?page_id=11803"},"modified":"2025-04-08T17:21:04","modified_gmt":"2025-04-08T16:21:04","slug":"an-energy-efficient-hybrid-security-model-for-large-scale-cloud-systems-integrating-blockchain-quantum-cryptography-and-post-quantum-algorithms","status":"publish","type":"page","link":"https:\/\/icertpublication.com\/index.php\/shodh-sari-2\/shodh-sari-vol-04-issue-02\/an-energy-efficient-hybrid-security-model-for-large-scale-cloud-systems-integrating-blockchain-quantum-cryptography-and-post-quantum-algorithms\/","title":{"rendered":"An Energy-Efficient Hybrid Security Model for Large-Scale Cloud Systems: Integrating Blockchain, Quantum Cryptography, and Post-Quantum Algorithms"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"11803\" class=\"elementor elementor-11803\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-26f1140 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"26f1140\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-e7aebf1\" data-id=\"e7aebf1\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-0580d5a elementor-widget elementor-widget-heading\" data-id=\"0580d5a\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">An Energy-Efficient Hybrid Security Model for Large-Scale Cloud Systems: Integrating Blockchain, Quantum Cryptography, and Post-Quantum Algorithms<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-33f6d3c elementor-widget elementor-widget-text-editor\" data-id=\"33f6d3c\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p dir=\"ltr\" style=\"line-height: 1.7999999999999998; text-align: center; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 12pt; font-family: Cambria,serif; color: #000000; background-color: transparent; font-weight: 400; font-style: normal; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;\">A, Neethu V<\/span><span style=\"font-size: 12pt; font-family: Cambria,serif; color: #000000; background-color: transparent; font-weight: 400; font-style: normal; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;\"><span style=\"font-size: 0.6em; vertical-align: super;\">1<\/span><\/span><span style=\"font-size: 12pt; font-family: Cambria,serif; color: #000000; background-color: transparent; font-weight: 400; font-style: normal; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;\">, Vaishnav, Arun<\/span><span style=\"font-size: 12pt; font-family: Cambria,serif; color: #000000; background-color: transparent; font-weight: 400; font-style: normal; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;\"><span style=\"font-size: 0.6em; vertical-align: super;\">2<\/span><\/span><span style=\"font-size: 12pt; font-family: Cambria,serif; color: #000000; background-color: transparent; font-weight: 400; font-style: normal; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;\"> and Khan, Mohammad Akram<\/span><span style=\"font-size: 12pt; font-family: Cambria,serif; color: #000000; background-color: transparent; font-weight: 400; font-style: normal; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;\"><span style=\"font-size: 0.6em; vertical-align: super;\">3<\/span><\/span><\/p><p dir=\"ltr\" style=\"line-height: 1.7999999999999998; text-align: center; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 12pt; font-family: Cambria,serif; color: #000000; background-color: transparent; font-weight: 400; font-style: normal; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;\"><span style=\"font-size: 0.6em; vertical-align: super;\">1<\/span><\/span><span style=\"font-size: 12pt; font-family: Cambria,serif; color: #000000; background-color: transparent; font-weight: 400; font-style: normal; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;\">Research Scholar, Department of Computer Science Engineering &amp; Technology, Madhav University, Sirohi, Rajasthan, India\u00a0<\/span><\/p><p dir=\"ltr\" style=\"line-height: 1.7999999999999998; text-align: center; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 12pt; font-family: Cambria,serif; color: #000000; background-color: transparent; font-weight: 400; font-style: normal; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;\"><span style=\"font-size: 0.6em; vertical-align: super;\">2<\/span><\/span><span style=\"font-size: 12pt; font-family: Cambria,serif; color: #000000; background-color: transparent; font-weight: 400; font-style: normal; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;\">Assistant Professor, Faculty of Computing and Informatics, Sir Padampat Singhania University, Udaipur, Rajasthan, India.<\/span><\/p><p dir=\"ltr\" style=\"line-height: 1.7999999999999998; text-align: center; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 12pt; background-color: transparent; font-family: Cambria, serif; color: #000000; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; font-variant-emoji: normal; vertical-align: baseline; white-space-collapse: preserve;\"><span style=\"font-size: 0.6em; vertical-align: super;\">3<\/span><\/span><span style=\"font-size: 12pt; background-color: transparent; font-family: Cambria, serif; color: #000000; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; font-variant-emoji: normal; vertical-align: baseline; white-space-collapse: preserve;\">Assistant Professor, Department of Computer Science and Application, Madhav University, Sirohi, Rajasthan, India<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-fd62ef1 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"fd62ef1\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-64007a6\" data-id=\"64007a6\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-19b45b3 elementor-widget elementor-widget-heading\" data-id=\"19b45b3\" data-element_type=\"widget\" id=\"Shodh-Sari-v4-i2-9A\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h6 class=\"elementor-heading-title elementor-size-default\">Abstract<\/h6>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c9a25f6 elementor-widget elementor-widget-text-editor\" data-id=\"c9a25f6\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p dir=\"ltr\" style=\"line-height: 1.7999999999999998; text-align: justify; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 12pt; font-family: Cambria,serif; color: #000000; background-color: transparent; font-weight: 400; font-style: normal; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;\">Cloud computing can be used to utilized to ensure data security and energy efficiency in large-scale environments. This paper, introduced in hybrid security model to integrate the block chain technology, Quantum Cryptography, and Post Quantum algorithms. This model provides a strong framework for ensuring data security and integrity. Post Quantum Cryptography algorithm might be utilized to discuss the prospects for cyber-attacks in quantum computing. It is focused on optimizing the energy consumption of both quantum cryptography and blockchain used to improve the overall efficiency of cloud system. The techniques used for data management and user scalability to handle the increased amount of data volumes and the growing number of users without sacrificing the performance. It also extends to multi-cloud environments and IOT to ensure user data security and confidentiality in a dispersed cloud setting. In order to improve cloud security, this article focuses on large-scale cloud settings by integrating post-quantum algorithms, blockchain technology, and quantum cryptography.<\/span><\/p><p dir=\"ltr\" style=\"line-height: 1.7999999999999998; text-align: justify; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 12pt; font-family: Cambria,serif; color: #000000; background-color: transparent; font-weight: 400; font-style: italic; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;\">Keywords<\/span><span style=\"font-size: 12pt; font-family: Cambria,serif; color: #000000; background-color: transparent; font-weight: 400; font-style: normal; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;\">: Cloud Computing, Quantum Cryptography, Blockchain, Powe of Work (PoW), Quantum Key Distribution (QKD), Proof of Stake (PoS)<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-f15bd5d elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"f15bd5d\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-e62f658\" data-id=\"e62f658\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-71adc6c elementor-widget elementor-widget-heading\" data-id=\"71adc6c\" data-element_type=\"widget\" id=\"Shodh-Sari-v4-i2-9i\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h6 class=\"elementor-heading-title elementor-size-default\">Impact Statement<\/h6>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9315140 elementor-widget elementor-widget-text-editor\" data-id=\"9315140\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p dir=\"ltr\" style=\"line-height: 1.7999999999999998; text-align: justify; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 12pt; font-family: Cambria,serif; color: #000000; background-color: transparent; font-weight: 400; font-style: normal; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;\">The integration of blockchain, quantum cryptography, and post-quantum algorithms into a hybrid security model for large-scale cloud systems represents a transformative advancement in cloud security, energy efficiency, and resilience against emerging cyber threats. As cloud computing infrastructures continue to expand, traditional security mechanisms face limitations in scalability, energy consumption, and vulnerability to quantum-enabled attacks. This research provides a novel security framework that enhances data integrity, confidentiality, and authentication while optimizing computational efficiency.<\/span><\/p><p dir=\"ltr\" style=\"line-height: 1.7999999999999998; text-align: justify; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 12pt; font-family: Cambria,serif; color: #000000; background-color: transparent; font-weight: 400; font-style: normal; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;\">By incorporating blockchain technology, the proposed model ensures tamper-proof data storage and decentralized security, reducing the risks associated with single points of failure. Quantum cryptography further strengthens security by leveraging quantum mechanics principles, offering an unbreakable encryption mechanism against evolving cyber threats. Additionally, post-quantum algorithms safeguard cloud systems against potential attacks from quantum computers, ensuring long-term security in the post-quantum era.<\/span><\/p><p dir=\"ltr\" style=\"line-height: 1.7999999999999998; text-align: justify; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 12pt; font-family: Cambria,serif; color: #000000; background-color: transparent; font-weight: 400; font-style: normal; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;\">Beyond enhancing security, this hybrid model prioritizes energy efficiency, addressing the increasing power demands of complex cryptographic computations. By optimizing cryptographic protocols and leveraging lightweight consensus mechanisms in blockchain, the model reduces energy consumption while maintaining high levels of security and performance. The impact of this research extends to cloud service providers, enterprises, and governments, ensuring a future-proof, sustainable, and secure cloud infrastructure capable of withstanding both classical and quantum threats.<\/span><\/p><p dir=\"ltr\" style=\"line-height: 1.7999999999999998; text-align: justify; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 12pt; font-family: Cambria,serif; color: #000000; background-color: transparent; font-weight: 400; font-style: normal; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;\">The findings of this study serve as a foundation for next-generation cloud security frameworks, paving the way for the widespread adoption of quantum-resistant and energy-efficient security solutions in large-scale cloud environments. The proposed model has the potential to revolutionize cybersecurity policies, regulatory compliance, and the overall trust in cloud computing ecosystems, ultimately shaping a more secure and sustainable digital future.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-730ff1b elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"730ff1b\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-cc96ed0\" data-id=\"cc96ed0\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-556547d elementor-widget elementor-widget-heading\" data-id=\"556547d\" data-element_type=\"widget\" id=\"Shodh-Sari-v4-i2-9Aa\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h6 class=\"elementor-heading-title elementor-size-default\">About the Author\n<\/h6>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3188d15 elementor-widget elementor-widget-text-editor\" data-id=\"3188d15\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p dir=\"ltr\" style=\"line-height: 1.7999999999999998; text-align: justify; margin-top: 10pt; margin-bottom: 0pt;\"><span style=\"font-size: 12pt; font-family: Cambria,serif; color: #000000; background-color: transparent; font-weight: bold; font-style: normal; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;\">Neethu V. A.<\/span><span style=\"font-size: 12pt; font-family: Cambria,serif; color: #000000; background-color: transparent; font-weight: 400; font-style: normal; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;\"> is an accomplished academician and Assistant Professor in the Faculty of Engineering &amp; Technology, Department of Computer Science Engineering and Technology. With a B.E. and M.E. from Anna University, Chennai, she is currently pursuing a Ph.D. at Madhav University of Rajasthan. With over three years of teaching experience, she has contributed extensively to academia through research papers and presentations at five national and international conferences. Her expertise spans quantum computing, cloud computing, and various other computing domains. She has published a peer-reviewed journal article and holds two patents. Additionally, she has participated in numerous Faculty Development Programs (FDPs) and completed over ten online courses, including ISRO-certified ones. <\/span><\/p><p dir=\"ltr\" style=\"line-height: 1.7999999999999998; text-align: justify; margin-top: 10pt; margin-bottom: 0pt;\"><span style=\"font-size: 12pt; font-family: Cambria,serif; color: #000000; background-color: transparent; font-weight: bold; font-style: normal; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;\">Dr. Arun Vaishnav,<\/span><span style=\"font-size: 12pt; font-family: Cambria,serif; color: #000000; background-color: transparent; font-weight: 400; font-style: normal; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;\"> an Assistant Professor at Sir Padampat Singhania University, Udaipur, has over a decade of teaching experience. He earned his Ph.D. from Mohanlal Sukhadia University in 2020 and holds an NPTEL certification in Computer Networks. His research contributions include 12 journal papers, eight conference proceedings, and four book chapters, with many indexed in Scopus. He has received three prestigious awards, published two patents, and played a vital role in organizing seminars and providing technical support for academic events.<\/span><\/p><p dir=\"ltr\" style=\"line-height: 1.7999999999999998; text-align: justify; margin-top: 10pt; margin-bottom: 0pt;\"><span style=\"font-size: 12pt; font-family: Cambria,serif; color: #000000; background-color: transparent; font-weight: bold; font-style: normal; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;\">Dr. Mohammad Akram Khan,<\/span><span style=\"font-size: 12pt; font-family: Cambria,serif; color: #000000; background-color: transparent; font-weight: 400; font-style: normal; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;\"> an Assistant Professor at Madhav University, Sirohi, has contributed significantly to research with seven published papers and active participation in faculty development programs. He also holds two patents, reflecting his commitment to innovation and academic excellence.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-36b9360 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"36b9360\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-4ca91af\" data-id=\"4ca91af\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-17e842d elementor-widget elementor-widget-heading\" data-id=\"17e842d\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h6 class=\"elementor-heading-title elementor-size-default\">References<\/h6>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-cdadc92 elementor-widget elementor-widget-text-editor\" data-id=\"cdadc92\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>\u00a0<\/p><ol style=\"margin-top: 0; margin-bottom: 0; padding-inline-start: 48px;\"><li dir=\"ltr\" style=\"list-style-type: decimal; font-size: 12pt; font-family: Cambria,serif; color: #000000; background-color: transparent; font-weight: 400; font-style: normal; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre; margin-left: -18pt;\" aria-level=\"1\"><p dir=\"ltr\" style=\"line-height: 1.7999999999999998; text-align: justify; margin-top: 0pt; margin-bottom: 0pt;\" role=\"presentation\"><span style=\"font-size: 12pt; font-family: Cambria,serif; color: #000000; background-color: transparent; font-weight: 400; font-style: normal; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;\">Alagic, G., Alagic, G., Apon, D., Cooper, D., Dang, Q., Dang, T., .\u202f.\u202f. &amp; Smith-Tone, D. (2022). <\/span><span style=\"font-size: 12pt; font-family: Cambria,serif; color: #000000; background-color: transparent; font-weight: 400; font-style: italic; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;\">Status report on the third round of the NIST post-quantum cryptography standardization process<\/span><span style=\"font-size: 12pt; font-family: Cambria,serif; color: #000000; background-color: transparent; font-weight: 400; font-style: normal; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;\">.<\/span><\/p><\/li><li dir=\"ltr\" style=\"list-style-type: decimal; font-size: 11pt; font-family: Cambria,serif; color: #000000; background-color: transparent; font-weight: 400; font-style: normal; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre; margin-left: -18pt;\" aria-level=\"1\"><p dir=\"ltr\" style=\"line-height: 1.7999999999999998; text-align: justify; margin-top: 0pt; margin-bottom: 0pt;\" role=\"presentation\"><span style=\"font-size: 12pt; font-family: Cambria,serif; color: #000000; background-color: transparent; font-weight: 400; font-style: normal; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;\">Bernstein, D. J. et al. (2009). The security of post-quantum public-key cryptography. In <\/span><span style=\"font-size: 12pt; font-family: Cambria,serif; color: #000000; background-color: transparent; font-weight: 400; font-style: italic; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;\">Proceedings of the 7th International Conference on Information Security<\/span><span style=\"font-size: 12pt; font-family: Cambria,serif; color: #000000; background-color: transparent; font-weight: 400; font-style: normal; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;\"> (pp. 175\u2013188).<\/span><\/p><\/li><li dir=\"ltr\" style=\"list-style-type: decimal; font-size: 12pt; font-family: Cambria,serif; color: #000000; background-color: transparent; font-weight: 400; font-style: normal; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre; margin-left: -18pt;\" aria-level=\"1\"><p dir=\"ltr\" style=\"line-height: 1.7999999999999998; text-align: justify; margin-top: 0pt; margin-bottom: 0pt;\" role=\"presentation\"><span style=\"font-size: 12pt; font-family: Cambria,serif; color: #000000; background-color: transparent; font-weight: 400; font-style: normal; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;\">Chen, L. et al. (2016). Report on post-quantum cryptography. <\/span><span style=\"font-size: 12pt; font-family: Cambria,serif; color: #000000; background-color: transparent; font-weight: 400; font-style: italic; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;\">NISTIR<\/span><span style=\"font-size: 12pt; font-family: Cambria,serif; color: #000000; background-color: transparent; font-weight: 400; font-style: normal; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;\">, <\/span><span style=\"font-size: 12pt; font-family: Cambria,serif; color: #000000; background-color: transparent; font-weight: 400; font-style: italic; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;\">8105<\/span><span style=\"font-size: 12pt; font-family: Cambria,serif; color: #000000; background-color: transparent; font-weight: 400; font-style: normal; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;\">. <\/span><a style=\"text-decoration: none;\" href=\"https:\/\/doi.org\/10.6028\/nist.ir.8105\"><span style=\"font-size: 12pt; font-family: Cambria,serif; color: #0000ff; background-color: transparent; font-weight: 400; font-style: normal; font-variant: normal; text-decoration: underline; -webkit-text-decoration-skip: none; text-decoration-skip-ink: none; vertical-align: baseline; white-space: pre-wrap;\">https:\/\/doi.org\/10.6028\/NIST.IR.8105<\/span><\/a><\/p><\/li><li dir=\"ltr\" style=\"list-style-type: decimal; font-size: 11pt; font-family: Cambria,serif; color: #000000; background-color: transparent; font-weight: 400; font-style: normal; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre; margin-left: -18pt;\" aria-level=\"1\"><p dir=\"ltr\" style=\"line-height: 1.7999999999999998; text-align: justify; margin-top: 0pt; margin-bottom: 0pt;\" role=\"presentation\"><span style=\"font-size: 12pt; font-family: Cambria,serif; color: #000000; background-color: transparent; font-weight: 400; font-style: normal; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;\">Costan, V., &amp; Devadas, S. (2016). Intel SGX explained. <\/span><span style=\"font-size: 12pt; font-family: Cambria,serif; color: #000000; background-color: transparent; font-weight: 400; font-style: italic; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;\">IACR Cryptology Eprint Archive<\/span><span style=\"font-size: 12pt; font-family: Cambria,serif; color: #000000; background-color: transparent; font-weight: 400; font-style: normal; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;\">, <\/span><span style=\"font-size: 12pt; font-family: Cambria,serif; color: #000000; background-color: transparent; font-weight: 400; font-style: italic; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;\">2016<\/span><span style=\"font-size: 12pt; font-family: Cambria,serif; color: #000000; background-color: transparent; font-weight: 400; font-style: normal; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;\">, 086.<\/span><\/p><\/li><li dir=\"ltr\" style=\"list-style-type: decimal; font-size: 11pt; font-family: Cambria,serif; color: #000000; background-color: transparent; font-weight: 400; font-style: normal; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre; margin-left: -18pt;\" aria-level=\"1\"><p dir=\"ltr\" style=\"line-height: 1.7999999999999998; text-align: justify; margin-top: 0pt; margin-bottom: 0pt;\" role=\"presentation\"><span style=\"font-size: 12pt; font-family: Cambria,serif; color: #000000; background-color: transparent; font-weight: 400; font-style: normal; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;\">Gentry, C. (2009). <\/span><span style=\"font-size: 12pt; font-family: Cambria,serif; color: #000000; background-color: transparent; font-weight: 400; font-style: italic; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;\">A fully homomorphic encryption scheme<\/span><span style=\"font-size: 12pt; font-family: Cambria,serif; color: #000000; background-color: transparent; font-weight: 400; font-style: normal; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;\">. Stanford University.<\/span><\/p><\/li><li dir=\"ltr\" style=\"list-style-type: decimal; font-size: 11pt; font-family: Cambria,serif; color: #000000; background-color: transparent; font-weight: 400; font-style: normal; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre; margin-left: -18pt;\" aria-level=\"1\"><p dir=\"ltr\" style=\"line-height: 1.7999999999999998; text-align: justify; margin-top: 0pt; margin-bottom: 0pt;\" role=\"presentation\"><span style=\"font-size: 12pt; font-family: Cambria,serif; color: #000000; background-color: transparent; font-weight: 400; font-style: normal; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;\">Gisin, N., Ribordy, G., Tittel, W., &amp; Zbinden, H. (2002). Quantum cryptography. <\/span><span style=\"font-size: 12pt; font-family: Cambria,serif; color: #000000; background-color: transparent; font-weight: 400; font-style: italic; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;\">Reviews of Modern Physics<\/span><span style=\"font-size: 12pt; font-family: Cambria,serif; color: #000000; background-color: transparent; font-weight: 400; font-style: normal; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;\">, <\/span><span style=\"font-size: 12pt; font-family: Cambria,serif; color: #000000; background-color: transparent; font-weight: 400; font-style: italic; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;\">74<\/span><span style=\"font-size: 12pt; font-family: Cambria,serif; color: #000000; background-color: transparent; font-weight: 400; font-style: normal; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;\">(1), 145\u2013195. <\/span><a style=\"text-decoration: none;\" href=\"https:\/\/doi.org\/10.1103\/revmodphys.74.145\"><span style=\"font-size: 12pt; font-family: Cambria,serif; color: #0000ff; background-color: transparent; font-weight: 400; font-style: normal; font-variant: normal; text-decoration: underline; -webkit-text-decoration-skip: none; text-decoration-skip-ink: none; vertical-align: baseline; white-space: pre-wrap;\">https:\/\/doi.org\/10.1103\/RevModPhys.74.145<\/span><\/a><\/p><\/li><li dir=\"ltr\" style=\"list-style-type: decimal; font-size: 11pt; font-family: Cambria,serif; color: #000000; background-color: transparent; font-weight: 400; font-style: normal; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre; margin-left: -18pt;\" aria-level=\"1\"><p dir=\"ltr\" style=\"line-height: 1.7999999999999998; text-align: justify; margin-top: 0pt; margin-bottom: 0pt;\" role=\"presentation\"><span style=\"font-size: 12pt; font-family: Cambria,serif; color: #000000; background-color: transparent; font-weight: 400; font-style: normal; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;\">Goldwasser, S., Micali, S., &amp; Rackoff, C. (2019). The knowledge complexity of interactive proof-systems. In O. Goldreich (Ed.), <\/span><span style=\"font-size: 12pt; font-family: Cambria,serif; color: #000000; background-color: transparent; font-weight: 400; font-style: italic; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;\">Providing sound foundations for cryptography: On the work of Shafi goldwasser and silvio micali<\/span><span style=\"font-size: 12pt; font-family: Cambria,serif; color: #000000; background-color: transparent; font-weight: 400; font-style: normal; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;\"> (pp. 203\u2013225). Association for Computing Machinery. <\/span><a style=\"text-decoration: none;\" href=\"https:\/\/doi.org\/10.1145\/3335741.3335750\"><span style=\"font-size: 12pt; font-family: Cambria,serif; color: #0000ff; background-color: transparent; font-weight: 400; font-style: normal; font-variant: normal; text-decoration: underline; -webkit-text-decoration-skip: none; text-decoration-skip-ink: none; vertical-align: baseline; white-space: pre-wrap;\">https:\/\/doi.org\/10.1145\/3335741.3335750<\/span><\/a><\/p><\/li><li dir=\"ltr\" style=\"list-style-type: decimal; font-size: 11pt; font-family: Cambria,serif; color: #000000; background-color: transparent; font-weight: 400; font-style: normal; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre; margin-left: -18pt;\" aria-level=\"1\"><p dir=\"ltr\" style=\"line-height: 1.7999999999999998; text-align: justify; margin-top: 0pt; margin-bottom: 0pt;\" role=\"presentation\"><span style=\"font-size: 12pt; font-family: Cambria,serif; color: #000000; background-color: transparent; font-weight: 400; font-style: normal; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;\">Hankerson, D., &amp; Menezes, A. (2021). Elliptic curve cryptography. In S. Jajodia, P. Samarati, M. Yung (Eds.), <\/span><span style=\"font-size: 12pt; font-family: Cambria,serif; color: #000000; background-color: transparent; font-weight: 400; font-style: italic; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;\">Encyclopedia of cryptography, security and privacy<\/span><span style=\"font-size: 12pt; font-family: Cambria,serif; color: #000000; background-color: transparent; font-weight: 400; font-style: normal; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;\"> (pp. 1\u20132). Springer. <\/span><a style=\"text-decoration: none;\" href=\"https:\/\/doi.org\/10.1007\/978-3-642-27739-9_245-2\"><span style=\"font-size: 12pt; font-family: Cambria,serif; color: #0000ff; background-color: transparent; font-weight: 400; font-style: normal; font-variant: normal; text-decoration: underline; -webkit-text-decoration-skip: none; text-decoration-skip-ink: none; vertical-align: baseline; white-space: pre-wrap;\">https:\/\/doi.org\/10.1007\/978-3-642-27739-9_245-2<\/span><\/a><\/p><\/li><li dir=\"ltr\" style=\"list-style-type: decimal; font-size: 11pt; font-family: Cambria,serif; color: #000000; background-color: transparent; font-weight: 400; font-style: normal; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre; margin-left: -18pt;\" aria-level=\"1\"><p dir=\"ltr\" style=\"line-height: 1.7999999999999998; text-align: justify; margin-top: 0pt; margin-bottom: 0pt;\" role=\"presentation\"><span style=\"font-size: 12pt; font-family: Cambria,serif; color: #000000; background-color: transparent; font-weight: 400; font-style: normal; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;\">Huang, X. et al. (2020). The energy cost of blockchain consensus algorithms. <\/span><span style=\"font-size: 12pt; font-family: Cambria,serif; color: #000000; background-color: transparent; font-weight: 400; font-style: italic; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;\">Future Generation Computer Systems<\/span><span style=\"font-size: 12pt; font-family: Cambria,serif; color: #000000; background-color: transparent; font-weight: 400; font-style: normal; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;\">, <\/span><span style=\"font-size: 12pt; font-family: Cambria,serif; color: #000000; background-color: transparent; font-weight: 400; font-style: italic; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;\">108<\/span><span style=\"font-size: 12pt; font-family: Cambria,serif; color: #000000; background-color: transparent; font-weight: 400; font-style: normal; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;\">, 99\u2013110.<\/span><\/p><\/li><li dir=\"ltr\" style=\"list-style-type: decimal; font-size: 11pt; font-family: Cambria,serif; color: #000000; background-color: transparent; font-weight: 400; font-style: normal; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre; margin-left: -18pt;\" aria-level=\"1\"><p dir=\"ltr\" style=\"line-height: 1.7999999999999998; text-align: justify; margin-top: 0pt; margin-bottom: 0pt;\" role=\"presentation\"><span style=\"font-size: 12pt; font-family: Cambria,serif; color: #000000; background-color: transparent; font-weight: 400; font-style: normal; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;\">Li, J., Wu, J., Jiang, G., &amp; Srikanthan, T. (2020). Blockchain-based public auditing for big data in cloud storage. <\/span><span style=\"font-size: 12pt; font-family: Cambria,serif; color: #000000; background-color: transparent; font-weight: 400; font-style: italic; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;\">Information Processing and Management<\/span><span style=\"font-size: 12pt; font-family: Cambria,serif; color: #000000; background-color: transparent; font-weight: 400; font-style: normal; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;\">, <\/span><span style=\"font-size: 12pt; font-family: Cambria,serif; color: #000000; background-color: transparent; font-weight: 400; font-style: italic; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;\">57<\/span><span style=\"font-size: 12pt; font-family: Cambria,serif; color: #000000; background-color: transparent; font-weight: 400; font-style: normal; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;\">(6), Article 102382. <\/span><a style=\"text-decoration: none;\" href=\"https:\/\/doi.org\/10.1016\/j.ipm.2020.102382\"><span style=\"font-size: 12pt; font-family: Cambria,serif; color: #0000ff; background-color: transparent; font-weight: 400; font-style: normal; font-variant: normal; text-decoration: underline; -webkit-text-decoration-skip: none; text-decoration-skip-ink: none; vertical-align: baseline; white-space: pre-wrap;\">https:\/\/doi.org\/10.1016\/j.ipm.2020.102382<\/span><\/a><\/p><\/li><li dir=\"ltr\" style=\"list-style-type: decimal; font-size: 11pt; font-family: Cambria,serif; color: #000000; background-color: transparent; font-weight: 400; font-style: normal; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre; margin-left: -18pt;\" aria-level=\"1\"><p dir=\"ltr\" style=\"line-height: 1.7999999999999998; text-align: justify; margin-top: 0pt; margin-bottom: 0pt;\" role=\"presentation\"><span style=\"font-size: 12pt; font-family: Cambria,serif; color: #000000; background-color: transparent; font-weight: 400; font-style: normal; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;\">Bajaz, R., Yadav, N., &amp; Yadav, P. (2025). Influencer Marketing and purchase intention: Exploring the mediating role of credibility. <\/span><span style=\"font-size: 12pt; font-family: Cambria,serif; color: #000000; background-color: transparent; font-weight: 400; font-style: italic; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;\">Edumania-An International Multidisciplinary Journal<\/span><span style=\"font-size: 12pt; font-family: Cambria,serif; color: #000000; background-color: transparent; font-weight: 400; font-style: normal; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;\">, <\/span><span style=\"font-size: 12pt; font-family: Cambria,serif; color: #000000; background-color: transparent; font-weight: 400; font-style: italic; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;\">03<\/span><span style=\"font-size: 12pt; font-family: Cambria,serif; color: #000000; background-color: transparent; font-weight: 400; font-style: normal; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;\">(01), 175\u2013186. https:\/\/doi.org\/10.59231\/edumania\/9105<\/span><\/p><\/li><li dir=\"ltr\" style=\"list-style-type: decimal; font-size: 11pt; font-family: Cambria,serif; color: #000000; background-color: transparent; font-weight: 400; font-style: normal; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre; margin-left: -18pt;\" aria-level=\"1\"><p dir=\"ltr\" style=\"line-height: 1.7999999999999998; text-align: justify; margin-top: 0pt; margin-bottom: 0pt;\" role=\"presentation\"><span style=\"font-size: 12pt; font-family: Cambria,serif; color: #000000; background-color: transparent; font-weight: 400; font-style: normal; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;\">Liu, Y. et al. (2017). Quantum key distribution: Advances and applications. <\/span><span style=\"font-size: 12pt; font-family: Cambria,serif; color: #000000; background-color: transparent; font-weight: 400; font-style: italic; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;\">International Journal of Quantum Information<\/span><span style=\"font-size: 12pt; font-family: Cambria,serif; color: #000000; background-color: transparent; font-weight: 400; font-style: normal; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;\">, <\/span><span style=\"font-size: 12pt; font-family: Cambria,serif; color: #000000; background-color: transparent; font-weight: 400; font-style: italic; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;\">15<\/span><span style=\"font-size: 12pt; font-family: Cambria,serif; color: #000000; background-color: transparent; font-weight: 400; font-style: normal; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;\">(3), 173\u2013202.<\/span><\/p><\/li><li dir=\"ltr\" style=\"list-style-type: decimal; font-size: 11pt; font-family: Cambria,serif; color: #000000; background-color: transparent; font-weight: 400; font-style: normal; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre; margin-left: -18pt;\" aria-level=\"1\"><p dir=\"ltr\" style=\"line-height: 1.7999999999999998; text-align: justify; margin-top: 0pt; margin-bottom: 0pt;\" role=\"presentation\"><span style=\"font-size: 12pt; font-family: Cambria,serif; color: #000000; background-color: transparent; font-weight: 400; font-style: normal; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;\">Nakamoto, S. (2008). Bitcoin: A peer-to-peer electronic cash system. https:\/\/bitcoin.org\/bitcoin.pdf<\/span><\/p><\/li><li dir=\"ltr\" style=\"list-style-type: decimal; font-size: 11pt; font-family: Cambria,serif; color: #000000; background-color: transparent; font-weight: 400; font-style: normal; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre; margin-left: -18pt;\" aria-level=\"1\"><p dir=\"ltr\" style=\"line-height: 1.7999999999999998; text-align: justify; margin-top: 0pt; margin-bottom: 0pt;\" role=\"presentation\"><span style=\"font-size: 12pt; font-family: Cambria,serif; color: #000000; background-color: transparent; font-weight: 400; font-style: normal; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;\">Pandey, S., Bhushan, B., &amp; Hameed, A. A. (2024). Cryptography (PQC) solutions for medical data security. <\/span><span style=\"font-size: 12pt; font-family: Cambria,serif; color: #000000; background-color: transparent; font-weight: 400; font-style: italic; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;\">Soft Computing in Industry 5.0 for Sustainability<\/span><span style=\"font-size: 12pt; font-family: Cambria,serif; color: #000000; background-color: transparent; font-weight: 400; font-style: normal; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;\">, <\/span><span style=\"font-size: 12pt; font-family: Cambria,serif; color: #000000; background-color: transparent; font-weight: 400; font-style: italic; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;\">339<\/span><span style=\"font-size: 12pt; font-family: Cambria,serif; color: #000000; background-color: transparent; font-weight: 400; font-style: normal; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;\">.<\/span><\/p><\/li><li dir=\"ltr\" style=\"list-style-type: decimal; font-size: 11pt; font-family: Cambria,serif; color: #000000; background-color: transparent; font-weight: 400; font-style: normal; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre; margin-left: -18pt;\" aria-level=\"1\"><p dir=\"ltr\" style=\"line-height: 1.7999999999999998; text-align: justify; margin-top: 0pt; margin-bottom: 0pt;\" role=\"presentation\"><span style=\"font-size: 12pt; font-family: Cambria,serif; color: #000000; background-color: transparent; font-weight: 400; font-style: normal; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;\">Joy, H. K. (2025b). IoT Makers: A Collaborative Learning Experience with TinyML. <\/span><span style=\"font-size: 12pt; font-family: Cambria,serif; color: #000000; background-color: transparent; font-weight: 400; font-style: italic; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;\">Shodh Sari-An International Multidisciplinary Journal<\/span><span style=\"font-size: 12pt; font-family: Cambria,serif; color: #000000; background-color: transparent; font-weight: 400; font-style: normal; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;\">, <\/span><span style=\"font-size: 12pt; font-family: Cambria,serif; color: #000000; background-color: transparent; font-weight: 400; font-style: italic; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;\">04<\/span><span style=\"font-size: 12pt; font-family: Cambria,serif; color: #000000; background-color: transparent; font-weight: 400; font-style: normal; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;\">(01), 194\u2013201. https:\/\/doi.org\/10.59231\/sari7787<\/span><\/p><\/li><li dir=\"ltr\" style=\"list-style-type: decimal; font-size: 11pt; font-family: Cambria,serif; color: #000000; background-color: transparent; font-weight: 400; font-style: normal; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre; margin-left: -18pt;\" aria-level=\"1\"><p dir=\"ltr\" style=\"line-height: 1.7999999999999998; text-align: justify; margin-top: 0pt; margin-bottom: 0pt;\" role=\"presentation\"><span style=\"font-size: 12pt; font-family: Cambria,serif; color: #000000; background-color: transparent; font-weight: 400; font-style: normal; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;\">Pilkington, M. (2016). Blockchain technology: Principles and applications. In F. X. Olleros, M. Zhegu (Eds.), <\/span><span style=\"font-size: 12pt; font-family: Cambria,serif; color: #000000; background-color: transparent; font-weight: 400; font-style: italic; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;\">Research handbook on digital transformations<\/span><span style=\"font-size: 12pt; font-family: Cambria,serif; color: #000000; background-color: transparent; font-weight: 400; font-style: normal; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;\"> (pp. 225\u2013253). Edward Elgar Publishing. <\/span><a style=\"text-decoration: none;\" href=\"https:\/\/doi.org\/10.4337\/9781784717766.00019\"><span style=\"font-size: 12pt; font-family: Cambria,serif; color: #0000ff; background-color: transparent; font-weight: 400; font-style: normal; font-variant: normal; text-decoration: underline; -webkit-text-decoration-skip: none; text-decoration-skip-ink: none; vertical-align: baseline; white-space: pre-wrap;\">https:\/\/doi.org\/10.4337\/9781784717766.00019<\/span><\/a><\/p><\/li><li dir=\"ltr\" style=\"list-style-type: decimal; font-size: 11pt; font-family: Cambria,serif; color: #000000; background-color: transparent; font-weight: 400; font-style: normal; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre; margin-left: -18pt;\" aria-level=\"1\"><p dir=\"ltr\" style=\"line-height: 1.7999999999999998; text-align: justify; margin-top: 0pt; margin-bottom: 0pt;\" role=\"presentation\"><span style=\"font-size: 12pt; font-family: Cambria,serif; color: #000000; background-color: transparent; font-weight: 400; font-style: normal; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;\">Chauhan, N., &amp; Kumar, M. (2024). Unleashing the Potential of Artificial Intelligence (AI) Tools in Phytogeographical studies. <\/span><span style=\"font-size: 12pt; font-family: Cambria,serif; color: #000000; background-color: transparent; font-weight: 400; font-style: italic; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;\">Shodh Sari-An International Multidisciplinary Journal<\/span><span style=\"font-size: 12pt; font-family: Cambria,serif; color: #000000; background-color: transparent; font-weight: 400; font-style: normal; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;\">, <\/span><span style=\"font-size: 12pt; font-family: Cambria,serif; color: #000000; background-color: transparent; font-weight: 400; font-style: italic; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;\">03<\/span><span style=\"font-size: 12pt; font-family: Cambria,serif; color: #000000; background-color: transparent; font-weight: 400; font-style: normal; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;\">(04), 47\u201366. https:\/\/doi.org\/10.59231\/sari7746<\/span><\/p><\/li><li dir=\"ltr\" style=\"list-style-type: decimal; font-size: 11pt; font-family: Cambria,serif; color: #000000; background-color: transparent; font-weight: 400; font-style: normal; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre; margin-left: -18pt;\" aria-level=\"1\"><p dir=\"ltr\" style=\"line-height: 1.7999999999999998; text-align: justify; margin-top: 0pt; margin-bottom: 0pt;\" role=\"presentation\"><span style=\"font-size: 12pt; font-family: Cambria,serif; color: #000000; background-color: transparent; font-weight: 400; font-style: normal; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;\">Robert, W., Denis, A., Thomas, A., Samuel, A., Kabiito, S. P., Morish, Z., &amp; Ali, G. (2024). A comprehensive review on cryptographic techniques for securing Internet of medical things: A state-of-the-art, applications, security attacks, mitigation measures, and future research direction. <\/span><span style=\"font-size: 12pt; font-family: Cambria,serif; color: #000000; background-color: transparent; font-weight: 400; font-style: italic; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;\">Mesopotamian Journal of Artificial Intelligence in Healthcare<\/span><span style=\"font-size: 12pt; font-family: Cambria,serif; color: #000000; background-color: transparent; font-weight: 400; font-style: normal; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;\">, <\/span><span style=\"font-size: 12pt; font-family: Cambria,serif; color: #000000; background-color: transparent; font-weight: 400; font-style: italic; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;\">2024<\/span><span style=\"font-size: 12pt; font-family: Cambria,serif; color: #000000; background-color: transparent; font-weight: 400; font-style: normal; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;\">, 135\u2013169. <\/span><a style=\"text-decoration: none;\" href=\"https:\/\/doi.org\/10.58496\/MJAIH\/2024\/016\"><span style=\"font-size: 12pt; font-family: Cambria,serif; color: #0000ff; background-color: transparent; font-weight: 400; font-style: normal; font-variant: normal; text-decoration: underline; -webkit-text-decoration-skip: none; text-decoration-skip-ink: none; vertical-align: baseline; white-space: pre-wrap;\">https:\/\/doi.org\/10.58496\/MJAIH\/2024\/016<\/span><\/a><\/p><\/li><li dir=\"ltr\" style=\"list-style-type: decimal; font-size: 11pt; font-family: Cambria,serif; color: #000000; background-color: transparent; font-weight: 400; font-style: normal; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre; margin-left: -18pt;\" aria-level=\"1\"><p dir=\"ltr\" style=\"line-height: 1.7999999999999998; text-align: justify; margin-top: 0pt; margin-bottom: 0pt;\" role=\"presentation\"><span style=\"font-size: 12pt; font-family: Cambria,serif; color: #000000; background-color: transparent; font-weight: 400; font-style: normal; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;\">Sahay, B. et al. (2019). A survey on cloud security mechanisms and challenges. <\/span><span style=\"font-size: 12pt; font-family: Cambria,serif; color: #000000; background-color: transparent; font-weight: 400; font-style: italic; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;\">Journal of Cloud Computing: Advances, Systems and Applications<\/span><span style=\"font-size: 12pt; font-family: Cambria,serif; color: #000000; background-color: transparent; font-weight: 400; font-style: normal; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;\">, <\/span><span style=\"font-size: 12pt; font-family: Cambria,serif; color: #000000; background-color: transparent; font-weight: 400; font-style: italic; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;\">8<\/span><span style=\"font-size: 12pt; font-family: Cambria,serif; color: #000000; background-color: transparent; font-weight: 400; font-style: normal; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;\">(1), 1\u201322.<\/span><\/p><\/li><li dir=\"ltr\" style=\"list-style-type: decimal; font-size: 11pt; font-family: Cambria,serif; color: #000000; background-color: transparent; font-weight: 400; font-style: normal; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre; margin-left: -18pt;\" aria-level=\"1\"><p dir=\"ltr\" style=\"line-height: 1.7999999999999998; text-align: justify; margin-top: 0pt; margin-bottom: 0pt;\" role=\"presentation\"><span style=\"font-size: 12pt; font-family: Cambria,serif; color: #000000; background-color: transparent; font-weight: 400; font-style: normal; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;\">Sasikumar, K., &amp; Nagarajan, S. (2024). Comprehensive review and analysis of cryptography techniques in cloud computing. <\/span><span style=\"font-size: 12pt; font-family: Cambria,serif; color: #000000; background-color: transparent; font-weight: 400; font-style: italic; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;\">IEEE Access<\/span><span style=\"font-size: 12pt; font-family: Cambria,serif; color: #000000; background-color: transparent; font-weight: 400; font-style: normal; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;\">, <\/span><span style=\"font-size: 12pt; font-family: Cambria,serif; color: #000000; background-color: transparent; font-weight: 400; font-style: italic; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;\">12<\/span><span style=\"font-size: 12pt; font-family: Cambria,serif; color: #000000; background-color: transparent; font-weight: 400; font-style: normal; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;\">, 52325\u201352351. <\/span><a style=\"text-decoration: none;\" href=\"https:\/\/doi.org\/10.1109\/ACCESS.2024.3385449\"><span style=\"font-size: 12pt; font-family: Cambria,serif; color: #0000ff; background-color: transparent; font-weight: 400; font-style: normal; font-variant: normal; text-decoration: underline; -webkit-text-decoration-skip: none; text-decoration-skip-ink: none; vertical-align: baseline; white-space: pre-wrap;\">https:\/\/doi.org\/10.1109\/ACCESS.2024.3385449<\/span><\/a><\/p><\/li><li dir=\"ltr\" style=\"list-style-type: decimal; font-size: 11pt; font-family: Cambria,serif; color: #000000; background-color: transparent; font-weight: 400; font-style: normal; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre; margin-left: -18pt;\" aria-level=\"1\"><p dir=\"ltr\" style=\"line-height: 1.7999999999999998; text-align: justify; margin-top: 0pt; margin-bottom: 0pt;\" role=\"presentation\"><span style=\"font-size: 12pt; font-family: Cambria,serif; color: #000000; background-color: transparent; font-weight: 400; font-style: normal; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;\">Parmar, M. (2024b). Interdisciplinarity and Indigenous knowledge. <\/span><span style=\"font-size: 12pt; font-family: Cambria,serif; color: #000000; background-color: transparent; font-weight: 400; font-style: italic; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;\">Edumania-An International Multidisciplinary Journal<\/span><span style=\"font-size: 12pt; font-family: Cambria,serif; color: #000000; background-color: transparent; font-weight: 400; font-style: normal; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;\">, <\/span><span style=\"font-size: 12pt; font-family: Cambria,serif; color: #000000; background-color: transparent; font-weight: 400; font-style: italic; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;\">02<\/span><span style=\"font-size: 12pt; font-family: Cambria,serif; color: #000000; background-color: transparent; font-weight: 400; font-style: normal; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;\">(03), 208\u2013215. https:\/\/doi.org\/10.59231\/edumania\/9068<\/span><\/p><\/li><li dir=\"ltr\" style=\"list-style-type: decimal; font-size: 11pt; font-family: Cambria,serif; color: #000000; background-color: transparent; font-weight: 400; font-style: normal; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre; margin-left: -18pt;\" aria-level=\"1\"><p dir=\"ltr\" style=\"line-height: 1.7999999999999998; text-align: justify; margin-top: 0pt; margin-bottom: 0pt;\" role=\"presentation\"><span style=\"font-size: 12pt; font-family: Cambria,serif; color: #000000; background-color: transparent; font-weight: 400; font-style: normal; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;\">Singh, S. K., Azzaoui, A., Choo, K. K. R., Yang, L. T., &amp; Park, J. H. (2023). Articles A comprehensive survey on blockchain for secure IoT-enabled smart city beyond 5G: Approaches, processes, challenges, and opportunities. Hum.-. Centric Comput. <\/span><span style=\"font-size: 12pt; font-family: Cambria,serif; color: #000000; background-color: transparent; font-weight: 400; font-style: italic; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;\">Informing Science<\/span><span style=\"font-size: 12pt; font-family: Cambria,serif; color: #000000; background-color: transparent; font-weight: 400; font-style: normal; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;\">, <\/span><span style=\"font-size: 12pt; font-family: Cambria,serif; color: #000000; background-color: transparent; font-weight: 400; font-style: italic; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;\">13<\/span><span style=\"font-size: 12pt; font-family: Cambria,serif; color: #000000; background-color: transparent; font-weight: 400; font-style: normal; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;\">, 51.<\/span><\/p><\/li><li dir=\"ltr\" style=\"list-style-type: decimal; font-size: 11pt; font-family: Cambria,serif; color: #000000; background-color: transparent; font-weight: 400; font-style: normal; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre; margin-left: -18pt;\" aria-level=\"1\"><p dir=\"ltr\" style=\"line-height: 1.7999999999999998; text-align: justify; margin-top: 0pt; margin-bottom: 0pt;\" role=\"presentation\"><span style=\"font-size: 12pt; font-family: Cambria,serif; color: #000000; background-color: transparent; font-weight: 400; font-style: normal; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;\">Sousa, A. L. et al. (2019). Blockchain and smart contracts in cloud computing: A comprehensive survey. <\/span><span style=\"font-size: 12pt; font-family: Cambria,serif; color: #000000; background-color: transparent; font-weight: 400; font-style: italic; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;\">Future Generation Computer Systems<\/span><span style=\"font-size: 12pt; font-family: Cambria,serif; color: #000000; background-color: transparent; font-weight: 400; font-style: normal; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;\">, <\/span><span style=\"font-size: 12pt; font-family: Cambria,serif; color: #000000; background-color: transparent; font-weight: 400; font-style: italic; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;\">96<\/span><span style=\"font-size: 12pt; font-family: Cambria,serif; color: #000000; background-color: transparent; font-weight: 400; font-style: normal; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;\">, 232\u2013247. <\/span><a style=\"text-decoration: none;\" href=\"https:\/\/doi.org\/10.1016\/j.future.2019.01.024\"><span style=\"font-size: 12pt; font-family: Cambria,serif; color: #0000ff; background-color: transparent; font-weight: 400; font-style: normal; font-variant: normal; text-decoration: underline; -webkit-text-decoration-skip: none; text-decoration-skip-ink: none; vertical-align: baseline; white-space: pre-wrap;\">https:\/\/doi.org\/10.1016\/j.future.2019.01.024<\/span><\/a><\/p><\/li><li dir=\"ltr\" style=\"list-style-type: decimal; font-size: 12pt; font-family: Cambria,serif; color: #000000; background-color: transparent; font-weight: 400; font-style: normal; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre; margin-left: -18pt;\" aria-level=\"1\"><p dir=\"ltr\" style=\"line-height: 1.7999999999999998; text-align: justify; margin-top: 0pt; margin-bottom: 0pt;\" role=\"presentation\"><span style=\"font-size: 12pt; font-family: Cambria,serif; color: #000000; background-color: transparent; font-weight: 400; font-style: normal; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;\">Zissis, D., &amp; Lekkas, D. (2012). Addressing cloud computing security issues. <\/span><span style=\"font-size: 12pt; font-family: Cambria,serif; color: #000000; background-color: transparent; font-weight: 400; font-style: italic; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;\">Future Generation Computer Systems<\/span><span style=\"font-size: 12pt; font-family: Cambria,serif; color: #000000; background-color: transparent; font-weight: 400; font-style: normal; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;\">, <\/span><span style=\"font-size: 12pt; font-family: Cambria,serif; color: #000000; background-color: transparent; font-weight: 400; font-style: italic; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;\">28<\/span><span style=\"font-size: 12pt; font-family: Cambria,serif; color: #000000; background-color: transparent; font-weight: 400; font-style: normal; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;\">(3), 583\u2013592. <\/span><a style=\"text-decoration: none;\" href=\"https:\/\/doi.org\/10.1016\/j.future.2010.12.006\"><span style=\"font-size: 12pt; font-family: Cambria,serif; color: #0000ff; background-color: transparent; font-weight: 400; font-style: normal; font-variant: normal; text-decoration: underline; -webkit-text-decoration-skip: none; text-decoration-skip-ink: none; vertical-align: baseline; white-space: pre-wrap;\">https:\/\/doi.org\/10.1016\/j.future.2010.12.006<\/span><\/a><\/p><\/li><li dir=\"ltr\" style=\"list-style-type: decimal; font-size: 12pt; font-family: Cambria,serif; color: #000000; background-color: transparent; font-weight: 400; font-style: normal; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre; margin-left: -18pt;\" aria-level=\"1\"><p dir=\"ltr\" style=\"line-height: 1.7999999999999998; text-align: justify; margin-top: 0pt; margin-bottom: 0pt;\" role=\"presentation\"><span style=\"font-size: 12pt; font-family: Cambria,serif; color: #000000; background-color: transparent; font-weight: 400; font-style: normal; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;\">AbdulRafiu, A., Makinde, S. O., Mohammed, A., &amp; Sakariyahu, S. (2025). Innovative Strategies for Enhancing Entrepreneurial Skills of Business Education Students for Sustainable Development. <\/span><span style=\"font-size: 12pt; font-family: Cambria,serif; color: #000000; background-color: transparent; font-weight: 400; font-style: italic; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;\">Edumania-An International Multidisciplinary Journal<\/span><span style=\"font-size: 12pt; font-family: Cambria,serif; color: #000000; background-color: transparent; font-weight: 400; font-style: normal; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;\">, <\/span><span style=\"font-size: 12pt; font-family: Cambria,serif; color: #000000; background-color: transparent; font-weight: 400; font-style: italic; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;\">03<\/span><span style=\"font-size: 12pt; font-family: Cambria,serif; color: #000000; background-color: transparent; font-weight: 400; font-style: normal; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;\">(01), 54\u201367. https:\/\/doi.org\/10.59231\/edumania\/9097<\/span><\/p><\/li><li dir=\"ltr\" style=\"list-style-type: decimal; font-size: 12pt; font-family: Cambria,serif; color: #000000; background-color: transparent; font-weight: 400; font-style: normal; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre; margin-left: -18pt;\" aria-level=\"1\"><p dir=\"ltr\" style=\"line-height: 1.7999999999999998; text-align: justify; margin-top: 0pt; margin-bottom: 0pt;\" role=\"presentation\"><span style=\"font-size: 12pt; font-family: Cambria,serif; color: #000000; background-color: transparent; font-weight: 400; font-style: normal; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;\">Walia, P. (2024). Role and application of artificial intelligence in business. <\/span><span style=\"font-size: 12pt; font-family: Cambria,serif; color: #000000; background-color: transparent; font-weight: 400; font-style: italic; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;\">Shodh Sari-An International Multidisciplinary Journal<\/span><span style=\"font-size: 12pt; font-family: Cambria,serif; color: #000000; background-color: transparent; font-weight: 400; font-style: normal; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;\">, <\/span><span style=\"font-size: 12pt; font-family: Cambria,serif; color: #000000; background-color: transparent; font-weight: 400; font-style: italic; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;\">03<\/span><span style=\"font-size: 12pt; font-family: Cambria,serif; color: #000000; background-color: transparent; font-weight: 400; font-style: normal; font-variant: normal; text-decoration: none; vertical-align: baseline; white-space: pre-wrap;\">(02), 244\u2013252. https:\/\/doi.org\/10.59231\/sari7700<\/span><\/p><\/li><\/ol>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>An Energy-Efficient Hybrid Security Model for Large-Scale Cloud Systems: Integrating Blockchain, Quantum Cryptography, and Post-Quantum Algorithms A, Neethu V1, Vaishnav, Arun2 and Khan, Mohammad Akram3 1Research Scholar, Department of Computer Science Engineering &amp; Technology, Madhav University, Sirohi, Rajasthan, India\u00a0 2Assistant Professor, Faculty of Computing and Informatics, Sir Padampat Singhania University, Udaipur, Rajasthan, India. 3Assistant Professor, [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":11637,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"site-sidebar-layout":"no-sidebar","site-content-layout":"page-builder","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"disabled","ast-breadcrumbs-content":"","ast-featured-img":"disabled","footer-sml-layout":"","theme-transparent-header-meta":"default","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"class_list":["post-11803","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/icertpublication.com\/index.php\/wp-json\/wp\/v2\/pages\/11803","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/icertpublication.com\/index.php\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/icertpublication.com\/index.php\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/icertpublication.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/icertpublication.com\/index.php\/wp-json\/wp\/v2\/comments?post=11803"}],"version-history":[{"count":7,"href":"https:\/\/icertpublication.com\/index.php\/wp-json\/wp\/v2\/pages\/11803\/revisions"}],"predecessor-version":[{"id":11810,"href":"https:\/\/icertpublication.com\/index.php\/wp-json\/wp\/v2\/pages\/11803\/revisions\/11810"}],"up":[{"embeddable":true,"href":"https:\/\/icertpublication.com\/index.php\/wp-json\/wp\/v2\/pages\/11637"}],"wp:attachment":[{"href":"https:\/\/icertpublication.com\/index.php\/wp-json\/wp\/v2\/media?parent=11803"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}