SO Ogundoyin, IA Kamil - Journal of Parallel and Distributed Computing, 2021 - Elsevier
Very recently, a number of intelligent applications have evolved in smart cities such as smart grid, smart parking, smart waste management, smart manufacturing, smart home, and smart …
A Tarannum, ZU Rahman, LK Rao… - IEEE Sensors …, 2020 - ieeexplore.ieee.org
Multimodal biometrics is an emerging technology for distributed data security. Single and multi-user data authentication plays a vital role in commercial or e-governance applications …
K Edemacu, B Jang, JW Kim - IEEE journal of biomedical and …, 2020 - ieeexplore.ieee.org
The digitization of health records due to technological developments has paved the way for patients to be collaboratively treated by different healthcare institutions. In collaborative …
Z Zhang, S Zhou - Computer Networks, 2021 - Elsevier
Abstract Internet of Things (IoT) networks has been widely deployed as the distributed computing and communication component in the smart city. The security problems in the …
Decentralization of education policies has been implemented in Indonesia and Malaysia; however, their potential impact on Islamic education technology innovation remains to be …
C Liu, F Xiang, Z Sun - Security and Communication Networks, 2022 - Wiley Online Library
Information sharing has become an important application in modern supply chain management systems with business technology development. Because traditional supply …
A Heshmati, M Bayat, MA Doostari… - Journal of Ambient …, 2023 - Springer
In smart home technology, we are facing with increasing development in communications and capabilities which enforces to design a robust and scalable scheme for access …
S Sabitha, MS Rajasree - Cluster Computing, 2021 - Springer
The exponential growth of data storage and sharing in cloud demands an efficient access control mechanism for flexible data sharing. Attribute-Based Encryption (ABE) is a promising …
Intrusion detection system (IDS) is a crucial component in ensuring the security of computer networks. It helps in identifying and responding to unauthorized access attempts or …