Background: The technological revolution has allowed users to exchange data and information in various fields, and this is one of the most prevalent uses of computer …
Wireless sensor networks (WSNs) have proven to be incredibly useful for forest applications that rely on sensing technologies for event detection and monitoring. This radical sensing …
Images with sensitive content require encryption for storage and transmission. Symmetric schemes can cipher them, while an asymmetric cryptosystem can distribute the secret key …
Hash functions are an essential mechanism in today's world of information security. It is common practice to utilize them for storing and verifying passwords, developing pseudo …
MR AlShalaan, SM Fati - Information, 2023 - mdpi.com
To address a business need, most organizations allow employees to use their own devices to enhance productivity and job satisfaction. For this purpose, the Bring Your Own Device …
P Parmar, J Gadhiya, S Vats, DK Verma… - … on Security of …, 2023 - ieeexplore.ieee.org
The rate of development in today's IT industry is unprecedented. Information is being stored and transformed at a faster and faster rate. Therefore, the importance of protecting sensitive …
H Li, D Li, W Liang - Cluster Computing, 2024 - Springer
The application of healthcare systems has led to an explosive growth in personal electronic health records (EHRs). These EHRs are generated from different healthcare institutions and …
A Sundas, S Badotra, GS Shahi, A Verma… - IEEE …, 2024 - ieeexplore.ieee.org
The escalating global prevalence of chronic and lifestyle-related illnesses presents substantial societal and economic challenges. This work delves into an extensive review of …
V Asteriou, K Kantelis, GA Beletsioti, A Valkanis… - Sensors, 2024 - mdpi.com
Low-Power Wide-Area Networks constitute a leading, emerging Internet-of-Things technology, with important applications in environmental and industrial monitoring and …