[HTML][HTML] Authentication, Access Control and Scalability models in Internet of Things Security-A Review

M Kokila, S Reddy - Cyber Security and Applications, 2024 - Elsevier
Abstract The Internet of Things (IoT) leads to the next phase of human interaction with
technology. With the help of the IoT, physical objects can be given the ability to generate …

An AI-enabled secure framework for enhanced elder healthcare

M Bhatia - Engineering Applications of Artificial Intelligence, 2024 - Elsevier
The healthcare sector has been revolutionized by Information and Communication
Technology (ICT), leading to increased patient life expectancy and reduced healthcare …

Introduction to IoT

TN Ananna, M Saifuzzaman - arXiv preprint arXiv:2312.06689, 2023 - arxiv.org
The Internet of Things (IoT) has rapidly transformed the 21st century, enhancing decision-
making processes and introducing innovative consumer services such as pay-as-you-use …

Multi-level authentication for security in cloud using improved quantum key distribution

A Kumar, G Verma - Network: Computation in Neural Systems, 2024 - Taylor & Francis
Cloud computing is an on-demand virtual-based technology to develop, configure, and
modify applications online through the internet. It enables the users to handle various …

[PDF][PDF] Cyber Security and Applications

M Kokila, S Reddy - e-tarjome.com
abstract The Internet of Things (IoT) leads to the next phase of human interaction with
technology. With the help of the IoT, physical objects can be given the ability to generate …