过去一年中添加的文章,按日期排序

Energy Efficient Secure Transmission Techniques for 5G Enabled HetNet

H Sharma - shodhganga.inflibnet.ac.in
56 天前 - network structure of 5G, the HetNets are also growing rapidly to increase the spectral
efficiency of the wireless network. The … Although, cryptography-based solutions have been …

Building modeling resistant Physically Unclonable Functions (PUFs) using Adversarial Machine Learning

K Prakash - 2024 - escholarship.mcgill.ca
62 天前 - cryptographic methods, relying on secret keys, have vulnerabilities that adversaries
can exploit through physical and software … of low power consumption, better cost-efficiency, …

Deep Learning Dataset Generation for Physical Layer Authentication in Wireless Sensor Networks (WSN)

C Dentremont, H Liu - … Wireless Communications and Mobile Computing …, 2024 - par.nsf.gov
65 天前 - … cost-effective solutions for Bridge SHM, its wireless nature … , particularly in energy
conservation requirements to extend … heavy communication overhead and no cryptography of …

[PDF][PDF] Secure and scalable data aggregation techniques for healthcare monitoring in WSN

KV Vidyapeeth, L Kalbhor - J. Discret …, 2024 - … .s3.ap-south-1.amazonaws.com
71 天前 - encryption keys and selecting cryptographic algorithms … conveyed through unsecured
wireless networks. Traditional … networks, and the study emphasizes energy conservation

[PDF][PDF] Efficient lightweight cryptography for resource-constrained WSN nodes

BRAC Trust's - … .s3.ap-south-1.amazonaws.com
78 天前 - … in wireless sensor networks through the use of cryptography. The study examines
the utilization of cryptographic methods … useful in WSN, where energy conservation is crucial. …

Achieving Secure and Reliable UAV Authentication: A Shamir's Secret Sharing Based Approach

G Bansal, B Sikdar - IEEE Transactions on Network Science …, 2024 - ieeexplore.ieee.org
94 天前 - … In [19], encryption operations were employed to generate … Secret Sharing is a
cryptographic technique developed by … His current research interests include wireless network

Emerging Research in Intelligent Systems: Proceedings of the CIT 2023

GFO Cifuentes, DGA Avilés, HVL Padilla - 2024 - books.google.com
104 天前 - … The series “Lecture Notes in Networks and Systems” publishes the latest developments
in Networks and Systems—quickly, informally and with high quality. Original research …

[图书][B] WSN and IoT: An Integrated Approach for Smart Applications

S Rani, A Taneja - 2024 - books.google.com
121 天前 - … in new communication scenarios for energy-efficient and … Mobile sensor networks
(MSNs): Mobile networks are not … detection algorithms, and encryption techniques can be …

[PDF][PDF] Network Security and Data Privacy in 6G Environment: Impacts and Challenges

SRCM Dasika, V Kakulapati, S Saligrama - 2024 - researchgate.net
130 天前 - … The 5G technology standard for broadband cellular networks … no network that is
immune to attacks, a stable and efficient … asymmetric key encryption techniques since quantum …

NFC Data Security Using Hill Cipher

GA Hutagalung, YA Dalimunte, I Khairina… - … Journal of Research …, 2024 - journal.gpp.or.id
156 天前 - … Hill Cipher, a linear algebra-based encryption technique, … wireless technology,
near-field communication (NFC) … encryption technique without compromising the efficiency