Evaluating pairing-free identity-based identification using curve25519
Identification schemes are cryptographic primitives that enable strong authentication for
access control mechanisms that are critical to the security of computerized systems. To …
access control mechanisms that are critical to the security of computerized systems. To …
Anomaly Detection in IoT Sensor Networks using Machine Learning
K Mithran, C Gopi - 2022 International Conference on …, 2022 - ieeexplore.ieee.org
Anomaly Detection is a promising new approach for quality control in wireless networks and
telecommunication networks. New modern network architecture enables intensive …
telecommunication networks. New modern network architecture enables intensive …
Mobile App Secure Authentication for Unified Software Architecture for Smart Computing IoT Devices
R Chadha, S Khullar, V Kaushik - Journal of Advanced …, 2023 - thejournalshouse.com
IoT devices connect everything to the internet in this century. This allows users to remotely
access and operate their equipment. Internet of Things (IoT) gadgets save time, allow …
access and operate their equipment. Internet of Things (IoT) gadgets save time, allow …
Knee Functional Telerehabilitation System for Inclusive Smart Cities Based on Assistive IoT Technologies
In the current smart cities, assistive IoT technologies are employed in several services to
improve the physical and social functioning of persons with disabilities (PwD) and elderly …
improve the physical and social functioning of persons with disabilities (PwD) and elderly …
The Internet of Things: Addressing the risks of smart homes: An analysis of Internet of Things-based smart homes from a security standpoint
M Seffer - 2023 - diva-portal.org
The security aspects of the Internet of Things (IoT) have become increasingly important as
the number of connected devices continues to grow. This study presents a thorough analysis …
the number of connected devices continues to grow. This study presents a thorough analysis …
[PDF][PDF] Monitoring Connectivity of Internet of Things Device on Zigbee Protocol
BPS Kurniabudi, SDB Jambi, SDB Jambi - repository.unsri.ac.id
Internet of Things (IoT) networks operators may not be fully aware whether each IoT device
in their network is functioning safe enough from cyber-attacks. This paper develops an IoT …
in their network is functioning safe enough from cyber-attacks. This paper develops an IoT …
[PDF][PDF] A Pairing-Free Identity-Based Identification Scheme with Tight Security Using Modified-Schnorr Signatures. Symmetry 2021, 13, 1330
The security of cryptographic schemes is proven secure by reducing an attacker which
breaks the scheme to an algorithm that could be used to solve the underlying hard …
breaks the scheme to an algorithm that could be used to solve the underlying hard …
Routing protocols: Key security issues and challenges in IoT, ad hoc, and sensor networks
C Kumara, S Prakashb - Security and Privacy Issues in IoT …, 2020 - books.google.com
The world is rapidly shifting toward a new era of communication where not only human but
also every device due to inherent capability to communicate is trying to connect with other …
also every device due to inherent capability to communicate is trying to connect with other …