S Anand, K Muhammad Rafeeque - Soft Computing for Security …, 2022 - Springer
WSN is made up of nodes that communicate with one another with the help of a wireless channel. These days the WSN is used to communicate among two or more nodes that are …
S Anand, G Suhana - 2021 3rd International Conference on …, 2021 - ieeexplore.ieee.org
WSN is highly defined to be a limited resource constrained group of network where energy acquisition plays a vital role. Sensor node in WSN is battery constrained and are required for …
P Nayana, S Anand - 2021 5th International Conference on …, 2021 - ieeexplore.ieee.org
In today's environment, the wireless sensor network is widely used to collect data and communication. we need to follow the trend it is essential to share important information …
R Vandana, SK BJ - 2020 4th International Conference on …, 2020 - ieeexplore.ieee.org
Cryptography has been utilized to address security issues on various administrations. It is essential to secure information and to guarantee the secure exchange of medical …
P Parvathy, ASR Ajai - 2020 International Conference on …, 2020 - ieeexplore.ieee.org
Nowadays, almost every person in the world uses the Internet to communicate to each other. For various applications, different types of images are transmitted over the Internet. Such …
A Sahoo, IK AK, SM Rajagopal - 2024 5th International …, 2024 - ieeexplore.ieee.org
As the advent of quantum computing looms, the cryptographic landscape faces unprecedented challenges that could render traditional algorithms like AES, RSA, and ECC …