Security of satellite-terrestrial communications: Challenges and potential solutions

I Ahmad, J Suomalainen, P Porambage, A Gurtov… - IEEE …, 2022 - ieeexplore.ieee.org
The integration of satellite and terrestrial networks has become inevitable in the next
generations of communications networks due to emerging needs of ubiquitous connectivity …

Data Security Complications on Computing Technology in Mobile Cloud

A Satishkumar, A Vidhya - … on Advancements in Smart Computing and …, 2023 - Springer
Mobile devices resource limitations are a direct result of mobile computing rapid
development. Nowadays, the gadget that was primarily used to receive calls and compose …

Network security protection system based on machine learning algorithm

Q Huang, Q Li - The International Conference on Forthcoming …, 2022 - ieeexplore.ieee.org
With the development of computer technology, network security has gradually become a
topic of concern. Illegal intrusions such as network viruses and Trojan horses have caused …

IOT AWARE SCHNORR SIGNATURE RUZICKA SIMILARITY FOR SECUREDACCESS CONTROL IN MOBILE VIRTUAL PRIVATE NETWORK

RAV Kumar, S Suganya - NeuroQuantology, 2022 - search.proquest.com
Keeping the data in a safe manner refers to the controlling of who has access to what typeof
data. With the increase in cyber attacks securing sensitive data becomes more complex and …