With the emergence of the Internet of Things (IoT) and the rapid advancement in sensor technology, wireless medical sensor networks (WMSNs) have become increasingly …
M Zha, J Wang, Y Nan, X Wang, Y Zhang, Z Yang - NDSS, 2022 - ndss-symposium.org
Team Chat (TACT) systems are now widely used for online collaborations and project management. A unique feature of these systems is their integration of third-party apps, which …
AF Nugraha, H Kabetta, IKS Buana… - 2023 IEEE …, 2023 - ieeexplore.ieee.org
This research aims to compare the performance and security between Json Web Token (JWT) and Platform Agnostic Security Tokens (PASETO) on RESTful API. Performance is …
Mobile ad-hoc networks (MANETs) have great potential applications in military missions or emergency rescue due to their no-infrastructure, self-organizing and multi hop capability …
A Nugroho, T Mantoro - 2023 6th International Conference of …, 2023 - ieeexplore.ieee.org
Using MD5 hashing of passwords in web logins is highly vulnerable to dictionary attacks. One online application for cracking hashed passwords using a dictionary attack that is free …
Y He, M Zhang, X Yang, QT Sun, J Luo, Y Yu - IEEE Access, 2020 - ieeexplore.ieee.org
The Road Side Unit (RSU) is an important part of the Internet of Vehicles (IoV), which collects a large number of user's privacy information and connects vehicles to the Internet …
Pada Buku Ini membahas tentang Perbandingan antara metode Entropy dan Metode ROC dalam menentukan bobot kriteria yang di gunakan pada Sistem pendukung keputusan …
IAS Jabbar, SH Shaker - Int. J. Interact. Mob. Technol., 2023 - researchgate.net
Information hiding one of the important field of security which provide secure level for the information. Achieving multi levels of security system often researchers used cryptography …