过去一年中添加的文章,按日期排序

A Survey on Secure Data Transfer in the Development of Internet of Things (IoT) Applications Using LoRaWAN Technology

M Sowmya, SM Sundaram, P Murugesan - SN Computer Science, 2024 - Springer
90 天前 - … This study focuses on IoT devices based on LoRaWAN, conducting a comprehensive
… system, protecting against replay attacks, ensuring end-to-end encryption, securing the …

The Characteristics of Cloud Computing in the Internet of Things and the Application of Key Technologies

H Yimit - Advances in Computer, Signals and Systems, 2024 - clausiuspress.com
90 天前 - … of key technology applications, we delve into encryption … Through case studies,
we demonstrate the practical … protection play a vital role in the integration of the Internet

[PDF][PDF] Securing Satellite Communication Networks

A Sharma, RK Jaiswal - ijgst.com
91 天前 - … This involves the improvement of security protocols, encryption algorithms, and …
, this studies delves into the crucial realm of securing satellite tv for pc conversation networks, …

Hardware Cybersecurity on the FPGA Platform During Network Interaction of Distributed Industrial Equipment

VA Kokovin, AN Sytin… - … Russian Smart Industry …, 2024 - ieeexplore.ieee.org
92 天前 - Methods of protecting network messaging are proposed by replacing separate, …
block encryption algorithms, presented in Section V. Section VI discusses the results of the study

Securing Data Files Using RSA-ElGamal and Diffie-Hellman Algorithms

A Sitohang, R Rosnelly… - … and Technology …, 2024 - prosiding-icostec.respati.ac.id
96 天前 - computers, mobile devices, or during internet browsing activities. The objective of
this study is … the SHA-256 function in cryptographic algorithms. Utilizing a combination of the …

[图书][B] Decision Making and Security Risk Management for IoT Environments

W Boulila, J Ahmad, A Koubaa, M Driss, IR Farah - 2024 - Springer
98 天前 - … not only all aspects of computer, network security, and cryptography, but related areas,
such … Therefore, securing the IoT environment becomes difficult for research and industry …

Data privacy and security in it: a review of techniques and challenges

OA Farayola, OL Olorunfemi, PO Shoetan - Computer Science & IT …, 2024 - fepbl.com
99 天前 - … Next, the review delves into the techniques employed to safeguard … Encryption
techniques, such as symmetric and asymmetric cryptography, play a crucial role in protecting

[PDF][PDF] SECURE DATA TRANSMISSION FOR CRYPTOGRAPHY USING STANDARD FORMAT

M ARULKUMAR - ijarst.in
102 天前 - Network security is involved in organizations, enterprises, and other types of institutions.
In this paper we also studied cryptography … cryptosystem for securing the characterized …

Connected Vehicle Security: Overview of Risks and Mitigation Strategies

AA Riffee, A Riffee, TA Youssef - SoutheastCon 2024, 2024 - ieeexplore.ieee.org
102 天前 - … because it is a lightly protected stream of vital information on … choosing an appropriate
encryption method. Many systems … This research has been very impactful in the world of …

Exploring the Effects of Block Chain-Based Security Systems on Cyber Security

R Mishra, K Kumar, SN Mehta… - 2024 2nd International …, 2024 - ieeexplore.ieee.org
102 天前 - … Disbursed ledger structures protected by encryption and … chain-based protection
systems to defend networks and online … The main objective of the research shifted to examining …