EPPDA: an efficient and privacy‐preserving data aggregation scheme with authentication and authorization for IoT‐based healthcare applications

FA Almalki, BO Soufiene - Wireless Communications and …, 2021 - Wiley Online Library
Nowadays, IoT technology is used in various application domains, including the healthcare,
where sensors and IoT enabled medical devices exchange data without human interaction …

Application of laplace transform to cryptography using linear combination of functions

EO Adeyefa, LS Akinola… - TWMS Journal of Applied …, 2021 - belgelik.isikun.edu.tr
The strength of nations, organizations such as military, intelligence agency, hinges primarily
on its ability to keep sensitive information secure from intruders. Today, cryptography is used …

Jensen-based new cryptographic scheme

SA Osikoya, EO Adeyefa - Journal of the Nigerian Society of …, 2022 - journal.nsps.org.ng
The surgent availability of data and the demand for more data to implement several
technological products which heavily depends on data have made the issue of cyber …

[PDF][PDF] Performance Evaluation of Laguerre Transform and Neural Network-based Cryptographic Techniques for Network Security

LA Akinyemi, BH Akinwole - academia.edu
As the world evolves day by day with new technologies, there is a need to design a secure
network in such a way that intruders and unauthorized persons should not have access to …

ON COMBINATORIAL IDENTITIES OF PELL-CHEBYSHEV TWIN NUMBER PAIRS.

R Rangarajan, H CK - Palestine Journal of Mathematics, 2022 - search.ebscohost.com
The pair of Lucas and Fibonacci numbers and Pell-Lucas and Pell numbers and their
numerous elegant combinatorial identities occupy a significant area in the study of …