Fault tolerance using leakybucket and network border patrol

V Vakkalanka, P Mohan - 2021 6th International Conference on …, 2021 - ieeexplore.ieee.org
Traffic of non-congestion control on the internet is on rise, traffic varies from TCP traffic to
congestion collapse. Router mechanisms need to be included to find and stop congestion in …

Securing Sustainable Energy Trading: An RSA-Encrypted IoT Solution for Smart Meter Data Transmission

V Valsan, KK Keerthan, NS Devnath… - 2024 International …, 2024 - ieeexplore.ieee.org
Smart grids have been replacing conventional energy grids in recent years and are deemed
the next generation of today's power infrastructure distribution. However, due to the …

Standardization Workflow Technology of Software Testing Processes and its Application to SRGM on RSA Timing Attack Tasks

N Li, Q Han, Y Zhang, C Li, Y He, H Liu, Z Mao - IEEE Access, 2022 - ieeexplore.ieee.org
Due to changing software requirements and increasing system complexity, which put
forward new challenges to the related testing processes to ensure software trustworthiness …

Analysis of key based cryptographic algorithms and its applications

NKS Keerthan, SP Marri… - 2023 IEEE 3rd International …, 2023 - ieeexplore.ieee.org
Information security is the process of safeguarding data. It safeguards its availability, privacy,
and integrity. The capacity to secure data from attacks, as well as efficiency and speed are …

Comparative Study of Cryptographic Algorithms in Post Quantum Computing Landscape

A Sahoo, IK AK, SM Rajagopal - 2024 5th International …, 2024 - ieeexplore.ieee.org
As the advent of quantum computing looms, the cryptographic landscape faces
unprecedented challenges that could render traditional algorithms like AES, RSA, and ECC …