A Lightweight and Privacy-Preserving Authentication Protocol for Healthcare in an IoT Environment
Q Xie, Z Ding, Q Xie - Mathematics, 2023 - mdpi.com
In Internet of Things (IoT)-based healthcare, sensor nodes are deployed to detect the
patient's physiological data in a wireless sensor network. In order to prevent unwarranted …
patient's physiological data in a wireless sensor network. In order to prevent unwarranted …
A lightweight and secure protocol for teleworking environment
F Algarni, S Ullah Jan - Plos one, 2024 - journals.plos.org
The Internet has advanced so quickly that we can now access any service at any time, from
any location. As a result of this capability, People around the world can benefit from the …
any location. As a result of this capability, People around the world can benefit from the …
Hyperchaos-based cryptosytem to secure WSN data transfer for smart home application
S Benzegane, M Bouhedda, N Batel - International Journal of Information …, 2024 - Springer
The purpose of this work is to introduce a new crypto-system for the protection of information
transfer within the context of the intelligent home implementation. A Hyperchaos-based Key …
transfer within the context of the intelligent home implementation. A Hyperchaos-based Key …
SIP-DDoS: SIP Framework for DDoS Intrusion Detection based on Recurrent Neural Networks
The rapid evolution of beyond fifth-generation (B5G) and sixth-generation (6G) networks has
significantly driven the growth of Internet of Things (IoT) applications. These applications are …
significantly driven the growth of Internet of Things (IoT) applications. These applications are …
Investigating the Effectiveness of Birthday Attack Strategies in Cryptography Network Security
GT Chavan, S Agrawal, NN Sakhare… - … on Smart Generation …, 2023 - ieeexplore.ieee.org
Cryptography is a crucial factor of community safety because it involves growing and
decoding mystery codes to guard touchy statistics from unauthorized right of entry. As the …
decoding mystery codes to guard touchy statistics from unauthorized right of entry. As the …
Check for updates SIP-DDOS: SIP Framework for DDoS Intrusion Detection Based on Recurrent Neural Networks
The rapid evolution of beyond fifth-generation (B5G) and sixth-generation (6G) networks has
significantly driven the growth of Internet of Things (IoT) applications. These applications are …
significantly driven the growth of Internet of Things (IoT) applications. These applications are …
SIP-DDoS: SIP Framework for DDoS Intrusion Detection Based on Recurrent Neural Networks
A Meddahi - Machine Learning for Networking - Springer
The rapid evolution of beyond fifth-generation (B5G) and sixth-generation (6G) networks has
significantly driven the growth of Internet of Things (IoT) applications. These applications are …
significantly driven the growth of Internet of Things (IoT) applications. These applications are …