[HTML][HTML] Data transmission using secure hybrid techniques for smart energy metering devices

G Ramyasri, GR Murthy, S Itapu, SM Krishna - e-Prime-Advances in …, 2023 - Elsevier
Data transfer between components, continuous device monitoring, and other features are
possible with an IoT-based energy management system. Due to its lightweight, compact …

A security protocol for D2D communications in 5G networks using elliptic curve cryptography

R Kishore, I Ioannou, C Christophorou… - International Journal of …, 2022 - Springer
Advancements in the field of wireless and mobile communication motivate academia,
industry, and standardisation organisations to explore new technologies to improve overall …

Using Graphic Based Systems to Improve Cryptographic Algorithms

E Chapman - 2016 - openrepository.aut.ac.nz
With the ever-expanding use of technology for communications, the demand for strong
cryptographic methods is continually growing. The implementation of cryptographic …

NS-2 implementation and comparison of ENABLE and HBQ protocol of access control scheme based on ECC for WSN security

SD Markande - 2014 International Conference on Advances …, 2014 - ieeexplore.ieee.org
Wireless sensor network (WSN) is dense cluster of sensor nodes that are spatilly arranged.
WSN applications such as mission-critical military, homeland security, critical health …

Analysis of network security using cypher technique

MAA Al-Zamili - 2022 - openaccess.altinbas.edu.tr
Cryptographic procedures, such as encryption algorithms and cryptanalysis tools,
necessitate a thorough understanding of mathematics. It's been used for a long time to teach …

[PDF][PDF] Wireless network data transfer energy optimization algorithm

AP Sawlikar, ZJ Khan, SG Akojwar - Int J Adv Res Sci Eng (IJARSE), 2015 - academia.edu
ABSTRACT Orthogonal Frequency Division Multiplexing (OFDM) is the most promising
modulation technique. It has been adopted by most wireless and wired communication …

Improving the Proof of Retrievability in Cloud Computing

DA Ahammed - i-manager's Journal on Cloud Computing, 2016 - search.proquest.com
Cloud computing provides resource sharing and handling of applications on internet without
having local or personal devices. The data integrity is one of the major challenges in cloud …

[PDF][PDF] Group Key Authentication against Vampire Attacks in WSN

S Ghate, V Deshpande, A Hiwale - spvryan.org
The Low-Power wireless network is stimulating way for study of sensing and pervasive
computing in the field of Ad-Hoc networks." Security" is the vital term that is required in the …

[引用][C] ETHNOBOTANY STUDY OF SOME ETHNOMEDICINAL PLANTS OF GOPALGANJ USED TO CURE DIABETES MELLITUS

BN Singh, SK Prasad, PK Singh