A lightweight D2D authentication protocol for relay coverage scenario in 5G mobile network

P Borgohain, H Choudhury - Computer Networks, 2023 - Elsevier
Abstract 5G cellular network is becoming a preferred communication network for deployment
of the Internet of Things (IoT), due to its high speed, better connectivity, increased …

[PDF][PDF] New algorithm for wireless network communication security

S Ahmed, M Nader - Int. J. Cryptogr. Inf. Secur, 2016 - academia.edu
This paper evaluates the security of wireless communication network based on the fuzzy
logic in Mat lab. A new algorithm is proposed and evaluated which is the hybrid algorithm …

[PDF][PDF] Applying security to data using symmetric encryption in MANET

A Bhosle, Y Pandey - International Journal of Emerging Technology and …, 2013 - Citeseer
Mobile ad-hoc network is wireless network composed of different nodes communicate with
each other without having to establish infrastructure. The security of such network is a major …

Selective encryption using natural language processing for text data in mobile ad hoc network

A Kushwaha, HR Sharma, A Ambhaikar - Modeling, Simulation, and …, 2018 - Springer
In today's era, security is highly recommended for data which is transferred over network.
Although various methods toward security are proposed day by day, the security loop holes …

[PDF][PDF] Comparison of Symmetric Block Encryption Algorithms

M Umair - ResearchGate, 2017 - researchgate.net
Internet is the heart of today's communication that has revolutionized all aspects of life.
However, as every coin has two sides. Therefore, disadvantages of internet also exist. Over …

A comprehensive survey on cryptography evaluation in mobile (MANETs)

S Bulla - Turkish Journal of Computer and Mathematics …, 2021 - turcomat.org
With the rapid development in network technology new network types based on wireless
communication have emerged. A large family of wireless communication networks is the …

[PDF][PDF] Triple Layered Encryption Algorithm for IEEE 802.11 WLANs in E-Government Services

MA Kabir, KA Sayeed, MA Matin… - … Journal of Computer …, 2013 - researchgate.net
Wireless local area network (WLAN) can provide e-government services at all levels, from
local to national as the WLAN enabled devices have the flexibility to move from one place to …

A Web Portal for Cognitive Behavioral Therapy Treatment

R Forsberg, R Kasendu, J Norén, F Thörnblad… - 2023 - diva-portal.org
Clinical psychologists currently struggle to organize information about patients during a
cognitive behavioral therapy (CBT) treatment. During a CBT treatment, the patients will have …

Selective Encryption Algorithm Based on Natural Language Processing for Text Data in Mobile Ad hoc Network

A Kushwaha, HR Sharma, A Ambhaikar - Innovations in Electronics and …, 2018 - Springer
In today's era, security is extremely recommended for data which is send over network. The
research problem states that although various approaches toward security are proposed day …

Integrating encryption technique in authentication of multicast protocol for Ad-hoc networks

T Devasia, R Visakh - 2013 Third International Conference on …, 2013 - ieeexplore.ieee.org
Ad-hoc networks are infrastructure-less and without central administration control, minimal
configuration and quick deployment make ad-hoc networks suitable for emergency …