[HTML][HTML] Challenges and developments in secure routing protocols for healthcare in WBAN: A comparative analysis

R Singla, N Kaur, D Koundal, A Bharadwaj - Wireless Personal …, 2022 - Springer
The rise in life expectancy of humans, COVID-19 pandemic and growing cost of medical
services has brought up huge challenges for the government and healthcare industry. Due …

[PDF][PDF] Elliptical curve cryptography image encryption scheme with aid of optimization technique using gravitational search algorithm

R Navatejareddy, M Jayabhaskar… - Indonesian Journal of …, 2022 - academia.edu
Image encryption enables users to safely transmit digital photographs via a wireless medium
while maintaining enhanced anonymity and validity. Numerous studies are being conducted …

[PDF][PDF] Pragmatic analysis of ECC based security models from an empirical perspective

N Purohit, S Joshi, M Pande, S Lincke - … .s3.ap-south-1.amazonaws.com
This paper provides a detailed discussion about currently proposed Elliptic Curve
Cryptography (ECC) models focusing on performance parameters such as Security …

[PDF][PDF] Comprehensive analysis of continuous authentication for mobile devices

A Dagar, K Singh, T Khan - researchgate.net
Continuous mobile authentication is an imperative aspect of ensuring the security and
privacy of data in the contemporary mobile computing landscape. With the proliferation of …