[PDF][PDF] Secure techniques for channel encryption in wireless body area network without the Certificate

C Monga, KS Raju, PM Arunkumar, AS Bist… - … & Mobile Computing …, 2022 - academia.edu
Wireless body area networks (WBANs) have seen an increase in popularity in recent years.
Electromagnetic waves created by the body have the capacity to connect nodes all over the …

A novel approach to secure biometric data using integer wavelet transform, chaotic sequences and improved logistic system-based watermarking

P Garg, A Jain - International Journal of Computer …, 2023 - inderscienceonline.com
Watermarking can be used for security as no one carries files or documents around
anymore. Digital watermarking is the technique of embedding information in available digital …

Quantum Cryptography: Basics, Effects on Communication, and Data Management

S Bhushan - Holistic Approach to Quantum Cryptography in Cyber …, 2022 - taylorfrancis.com
In today's world, security in data communication has become a top-most priority in every
organization. In general, cryptography is defined as the methodology to ensure data is …

Cyber Security Techniques Management

M Shukla, F Ziya, S Arun, SP Singh - Holistic Approach to …, 2022 - taylorfrancis.com
The internet is one of the most widespread and fastest-growing areas of technological
development. In today's era, many organizations like business, distributed technologies …

Enhanced Lung Nodule Classification through Ensemble Transfer Learning Models

AK Singh, A Shukla, K Shukla - 2024 1st International …, 2024 - ieeexplore.ieee.org
Currently, lung cancer ranks as the second leading cause of mortality worldwide, surpassed
only by heart attacks. Lung cancer is characterised by the formation of a malignant tumour in …

Enhanced Dual Image Embedding Technique for Robust Image Authentication

AK Singh, L Kumar - 2024 1st International Conference on …, 2024 - ieeexplore.ieee.org
Digital image embedding techniques are widely recognized for their utility in preserving
copyright, ensuring digital imprint security, and authenticating image integrity. Moreover …

Wireless Power Transmission: A Review

S Pachauri, R Kumar, A Saxena, R Yadav… - Proceedings of 3rd …, 2022 - Springer
Wireless power transmission (WPT) is the vast area subject because this technology has the
ability to enhance the upcoming future wireless power transmission will have great impact in …

11 Quantum Cryptography

S Bhushan - Holistic Approach to Quantum Cryptography in …, 2022 - books.google.com
The main objective of providing security is to restrict information and resource access to the
authorized people who utilize the system. In general, a security breach can be classified into …

7 Cyber Security

S Goel, M Agrawal - … Approach to Quantum Cryptography in Cyber …, 2022 - books.google.com
Nowadays, it appears that things are going to be different in the internet space as an
outcome of the introduction of smart things that can generate and communicate data over …

Quantum Number: Error Correction Circuits and Methods

S Bhushan - Holistic Approach to Quantum Cryptography in Cyber …, 2022 - taylorfrancis.com
Quantum mistake rectification code has a significant task to carry out in shielding the data
from blunders coming about because of de lucidness and other quantum commotion …