Publications by authors named "Elissa Mollakuqe"

Background: Cryptography plays a crucial role in securing digital communications and data storage. This study evaluates the Transparent Key Management Algorithm utilizing Merkle trees, focusing on its performance and security effectiveness in cryptographic key handling.

Methods: The research employs simulated experiments to systematically measure and analyze key operational metrics such as insertion and verification times.

View Article and Find Full Text PDF

Background: This research delves into the critical aspects of identity management, access control, and authorization practices within the domains of public and private universities. Identity management involves the meticulous management and control of user identities, encompassing the establishment and maintenance of user profiles, role assignments, and access privileges. Access control is the practice of defining and enforcing policies that govern who can access an IT system or application and which resources they can interact with.

View Article and Find Full Text PDF