Open Access iconOpen Access

REVIEW

Review of Communication Protocols and Cryptographic Techniques Applied in Secure Token Transmission

Michael Juma Ayuma1,*, Shem Mbandu Angolo1, Philemon Nthenge Kasyoka2, Simon Maina Karume3

1 Department of Computer Science and Information Technology, School of Computing and Mathematics, The Co-Operative University of Kenya, Karen, Nairobi, P.O. Box 24814-00502, Kenya
2 School of Science and Computing, South Eastern Kenya University, Kitui, P.O Box 170-90200, Kenya
3 Department of Computer Science and Information Technology, Kabarak University, Nakuru, P.O Box 15232-20100, Kenya

* Corresponding Author: Michael Juma Ayuma. Email: email

Journal of Cyber Security 2025, 7, 307-341. https://doi.org/10.32604/jcs.2025.067360

Abstract

Token transmission is a fundamental component in diverse domains, including computer networks, blockchain systems, distributed architectures, financial transactions, secure communications, and identity verification. Ensuring optimal performance during transmission is essential for maintaining the efficiency of data in transit. However, persistent threats from adversarial actors continue to pose significant risks to the integrity, authenticity, and confidentiality of transmitted data. This study presents a comprehensive review of existing research on token transmission techniques, examining the roles of transmission channels, emerging trends, and the associated security and performance implications. A critical analysis is conducted to assess the strengths, limitations, and applicability of various methods across different use cases, while identifying key advancements and enduring challenges. The findings aim to support researchers, practitioners and policymakers in selecting appropriate token transmission strategies and to provide a foundation for future innovations in this critical area.

Keywords

Security protocols; token; encryption; blockchain; cryptography; token transmission

Cite This Article

APA Style
Ayuma, M.J., Angolo, S.M., Kasyoka, P.N., Karume, S.M. (2025). Review of Communication Protocols and Cryptographic Techniques Applied in Secure Token Transmission. Journal of Cyber Security, 7(1), 307–341. https://doi.org/10.32604/jcs.2025.067360
Vancouver Style
Ayuma MJ, Angolo SM, Kasyoka PN, Karume SM. Review of Communication Protocols and Cryptographic Techniques Applied in Secure Token Transmission. J Cyber Secur. 2025;7(1):307–341. https://doi.org/10.32604/jcs.2025.067360
IEEE Style
M. J. Ayuma, S. M. Angolo, P. N. Kasyoka, and S. M. Karume, “Review of Communication Protocols and Cryptographic Techniques Applied in Secure Token Transmission,” J. Cyber Secur., vol. 7, no. 1, pp. 307–341, 2025. https://doi.org/10.32604/jcs.2025.067360



cc Copyright © 2025 The Author(s). Published by Tech Science Press.
This work is licensed under a Creative Commons Attribution 4.0 International License , which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
  • 565

    View

  • 367

    Download

  • 0

    Like

Share Link