REPACA: Robust ECC based privacy-controlled mutual authentication and session key sharing protocol in coalmines application with provable security

CM Kumar, SK Dwivedi, M Brindha… - Peer-to-Peer Networking …, 2024 - Springer
The underground environment and its components are susceptible to various attacks due to
their role in monitoring environmental conditions and future predictions. Our review of …

Next Generation Firewall and Self Authentication for Network Security

B Singh, SS Cheema - 2023 Seventh International Conference …, 2023 - ieeexplore.ieee.org
In the era of the technologies, given the importance of the prevalence of the Internet, network
safety is now essential to maintaining the accessibility and confidentiality of networks and …

Securing the virtual marketplace: Navigating the landscape of security and privacy challenges in E-Commerce

GC Oguta - GSC Advanced Research and Reviews, 2024 - gsconlinepress.com
This paper provides a comprehensive examination of the evolving challenges and critical
considerations surrounding security and privacy within the realm of e-commerce. As the …

A Method for Detecting Outliers and Identifying Typical Power Consumption Patterns in Low-Voltage Station Area Measurement Data Based on Two-Step Cluster …

H Lu, B Li, F Zhai, M Xu - 2024 6th International Conference on …, 2024 - ieeexplore.ieee.org
This paper proposes a method for detecting outliers and identifying typical power
consumption patterns in low-voltage station area measurement data based on two-step …

[引用][C] Privacy and security issues in fog-to-fog communication: A survey

T Murkomen - World Journal of Advanced …, 2023 - World Journal of Advanced …