[HTML][HTML] Efficient time-oriented latency-based secure data encryption for cloud storage
S Ahmad, S Mehfuz - Cyber Security and Applications, 2024 - Elsevier
To ensure data security in the cloud, there exist several techniques proposed by various
researchers. The most common method is the usage of data encryption techniques like …
researchers. The most common method is the usage of data encryption techniques like …
A Software Framework for Intelligent Security Measures Regarding Sensor Data in the Context of Ambient Assisted Technology
Ambient assisted technology (AAT), which has the potential to enhance patient care and
productivity and save costs, has emerged as a strategic goal for developing e-healthcare in …
productivity and save costs, has emerged as a strategic goal for developing e-healthcare in …
Strengthening KMS Security with Advanced Cryptography, Machine Learning, Deep Learning, and IoT Technologies
This paper presents an innovative approach to strengthening Key Management Systems
(KMS) against the escalating landscape of cyber threats by integrating advanced …
(KMS) against the escalating landscape of cyber threats by integrating advanced …
An IHPO-WNN-Based Federated Learning System for Area-Wide Power Load Forecasting Considering Data Security Protection
B Shi, X Zhou, P Li, W Ma, N Pan - Energies, 2023 - mdpi.com
With the rapid growth of power demand and the advancement of new power system
intelligence, smart energy measurement system data quality and security are also facing the …
intelligence, smart energy measurement system data quality and security are also facing the …
Enhancing security in IIoT applications through efficient quantum key exchange and advanced encryption standard
HV Krishna, KR Sekhar - Soft Computing, 2024 - Springer
The industrial internet of things (IIoT) refers to a system of interconnected equipment,
sensors, and devices deployed within industrial environments whose primary function is to …
sensors, and devices deployed within industrial environments whose primary function is to …
Comparative Analysis of Encryption and Decryption for Securing Environmental Sector Telemetry Data
A Abdullah, N Hafeez, A Ur Rehman… - … of Computing and …, 2024 - journals.uob.edu.bh
This work investigates the encryption and decoding strategies for getting ecological sensor
telemetry information. The review assesses both symmetric and awry encryption calculations …
telemetry information. The review assesses both symmetric and awry encryption calculations …
[PDF][PDF] A Hybrid Algorithm For Enhancement of the Data Security during Network Transmission Based on RSA and DH.
O Salah, A El-Sawy, M Taha - … Journal of Intelligent Engineering & Systems, 2023 - inass.org
Due to the tremendous technological transformation, more technologies and internet of
things (IoT) devices are employed in today's digital world. The majority of these technologies …
things (IoT) devices are employed in today's digital world. The majority of these technologies …
Novel methods in utilizing wireless sensor networks with blockchain technology: A review
AMB Giridi, L Jhansi, DT Sharon… - MATEC Web of …, 2024 - matec-conferences.org
Wireless Sensor Networks (WSNs) play a vital role in achieving quick and efficient results.
These networks comprise small, affordable sensors that collect valuable data from their …
These networks comprise small, affordable sensors that collect valuable data from their …
An Energy-Efficient Cluster Head Selection and Secure Data Transmission in WSN using Spider Monkey Optimized Algorithm and Hybrid Cryptographic with Security
M Yuvaraja, S Sureshkumar… - Salud, Ciencia y …, 2024 - conferencias.saludcyt.ar
To conserve energy in wireless sensor networks, clustering is the well-known strategies.
However, choosing a cluster head that is energy efficient is crucial for the best clustering …
However, choosing a cluster head that is energy efficient is crucial for the best clustering …
Multi‐lingual encryption technique using Unicode and Riemann zeta function and elliptic curve cryptography for secured routing in wireless sensor networks
K Yesodha, S Viswanathan, M Krishnamurthy… - Concurrency and … - Wiley Online Library
Secure routing and communication with confidentiality based on encryption of texts in
multiple natural languages are challenging issues in wireless sensor networks which are …
multiple natural languages are challenging issues in wireless sensor networks which are …