A Survey on Key Agreement and Authentication Protocol for Internet of Things Application

MK Hasan, Z Weichen, N Safie, FRA Ahmed… - IEEE …, 2024 - ieeexplore.ieee.org
The Internet of Things (IoT) represents a dynamic infrastructure, leveraging sensing and
network communication technology to establish ubiquitous connectivity among people …

A review on role of image processing techniques to enhancing security of IoT applications

AM Al-Ghaili, SS Gunasekaran, N Jamil… - IEEE …, 2023 - ieeexplore.ieee.org
Once an image has been processed by, for example, a robot machine, for the purpose of, for
example, features extraction or meaningful information retrieval, has a secure scheme been …

[引用][C] A critical cybersecurity analysis and future research directions for the internet of things: a comprehensive review

U Tariq, I Ahmed, AK Bashir, K Shaukat - Sensors, 2023 - MDPI

An Efficient and Lightweight Chaotic Function with Key Exchange Protection For Man in the Middle Attack in Mobile Ad-hoc Networks (MANET)

AK Soni, R Gupta, A Khare - 2023 - researchsquare.com
Abstract Independent communication in Mobile Ad-hoc Networks is widely recommended in
Ad-hoc Networks to easily transmit data in undefined situations and make strong …
为了回应用户根据美国数字千年版权法案 (DMCA) 向我们提交的投诉,我们已从此页上移除了 1 个结果。如果需要,您可以访问 LumenDatabase.org,查看导致结果遭到移除的 DMCA 投诉内容