Blockchain data secure transmission method based on homomorphic encryption

S Peng, Z Cai, W Liu, W Wang, G Li… - Computational …, 2022 - Wiley Online Library
To ensure the security of data transmission and recording in Internet environment monitoring
systems, this paper proposes a study of a secure method of blockchain data transfer based …

[Retracted] Data Transmission and Processing Analysis of Power Economic Management Terminal Based on the Internet of Things

H Tang - Journal of Sensors, 2022 - Wiley Online Library
In order to explore how the power economy can realize the data transmission and
processing of the management terminal, this paper presents a data transmission and …

Design Simulation and Assessment of Prediction of Mortality in Intensive Care Unit Using Intelligent Algorithms

SK Alaria, V Sharma, A Raj, V Kumar - Mathematical Statistician and …, 2022 - philstat.org
Design Simulation and Assessment of Prediction of Mortality in Intensive Care Unit Using
Intelligent Algorithms Page 1 Mathematical Statistician and Engineering Applications ISSN …

Importance of WPA3 in fog computing

VK Saraogi, DK Matolia, J Kumar, MK Saini… - AIP Conference …, 2023 - pubs.aip.org
This article discusses security issues and how they may be resolved using the technologies
that will be included into the WPA3 fog network. Worldwide, there are billions of IoT devices …

An Approach for Cloud Security Using TPA-and Role-Based Hybrid Concept

P Singh, MK Mukhija, SK Alaria - Proceedings of Third International …, 2022 - Springer
In the cloud environment, enormous amount of the data is shared on the server for the
availability of access to the employees or customers related to the organization. Two main …

Analysis of Optimized Algorithms for Quality of Service in IoT Communication

U Tomer, P Gandhi - International Conference on Emergent Converging …, 2022 - Springer
Abstract The Internet of Things (IoT) has evolved over the last decade to connect a massive
number of objects. These connected objects provide a vast number of services to enhance …

Lightweight encryption of enterprise data and secure management of eventual graphical model construction

K Liu, L Zhu, B Xu - Applied Mathematics and Nonlinear Sciences, 2023 - sciendo.com
In this paper, we use the event map as well as the even map reaction system, combined with
the lightweight network data transmission encryption method of matrix tensor product, to …

A Security Approach to Manage a Smart City's Image Data on Cloud

MK Mukhija, SK Alaria, P Singh - AI-Centric Smart City …, 2022 - api.taylorfrancis.com
In the cloud environment, an enormous amount of the data is shared on the server for
available access to the employees or customers related to the organization. Two main …

Application of CDMA Interference Estimation in Secure Transmission of Big Data in Blockchain Communication

T Dong, B Zhong, Y Tan - 2022 International Conference on …, 2022 - ieeexplore.ieee.org
In recent years, with the improvement of data transmission technology, blockchain has
become one of the important ways of data transmission. When the blockchain data …

[PDF][PDF] RAPID RESPONSE SMART BLIND STICK WITH OBSTACLE DETECTION USING ARDUINO

A Pathak, AP Singh, H Sharma, S Kumar, Y Saini - academia.edu
The smart blind stick helps visually impaired people to commute and to do their work easily.
The usual blind stick doesn't detect the obstacle in the way of visually impaired person and …