[PDF][PDF] Efficient public key cryptosystem for wireless network
S Venkatesan, S Bhatnagar, IMH Cajo… - …, 2023 - academia.edu
Remote sensor networks comprise of self-ruling sensor hubs connected to at least one base
stations. As Wireless sensor networks keeps on developing, they become defenseless …
stations. As Wireless sensor networks keeps on developing, they become defenseless …
A secure public key cryptosystem based medical records using non-commutative group
A Ramamoorthy, P Jayagowri - Journal of Physics: Conference …, 2021 - iopscience.iop.org
Tolerant records, including specialists' conclusions of illnesses, hint of medicines and
patients' conditions, nursing activities, and assessment results from united wellbeing calling …
patients' conditions, nursing activities, and assessment results from united wellbeing calling …
Computer-Assisted Collaborative Learning for Enhancing Students Intellectual Ability Using Machine Learning Techniques
J Wang, F Liu - Wireless Personal Communications, 2022 - Springer
Abstract Computer-assisted Collaborative Learning (CCL) is a good teaching technique to
enhance students' learning and intellectual performance consistency. Several studies have …
enhance students' learning and intellectual performance consistency. Several studies have …
[PDF][PDF] A Secure and Enhanced Public Key Cryptosystem Using Double Conjugacy Search Problem Near-Ring
V Muthukumarn, M Adhiyaman… - Advances in …, 2020 - research-publication.com
The recent advancement in modern communication systems leads to the requirement of
secure cryptosystems for efficient data transfer processes. The public key cryptosystem …
secure cryptosystems for efficient data transfer processes. The public key cryptosystem …
Motion vector steganography algorithm of sports training video integrating with artificial bee colony algorithm and human-centered AI for web applications
J Tong, Z Cao, W Fu - Journal of Intelligent Systems, 2023 - degruyter.com
In multimedia correspondence, steganography schemes are commonly applied. To reduce
storage capacity, multimedia files, including images, are always compressed. Most …
storage capacity, multimedia files, including images, are always compressed. Most …
Efficient authenticated key establishment protocol for telecare medicine information systems
M Mahalakshmi, RL Kumar, KS Ranjini… - AIP Conference …, 2022 - pubs.aip.org
Secure checked based three person affirmation plot for records trade telecare remedy facts
structures permits two customers simply store their verifiers prepared from their certifiable …
structures permits two customers simply store their verifiers prepared from their certifiable …
Локальні майже-кільця, їх структури та система GAP
I Raievska, M Raievska - Ukrains' kyi Matematychnyi Zhurnal, 2024 - umj.imath.kiev.ua
Local nearrings, their structure, and the GAP system | Ukrains’kyi Matematychnyi Zhurnal
Skip to main content Skip to main navigation menu Skip to site footer Ukrains’kyi …
Skip to main content Skip to main navigation menu Skip to site footer Ukrains’kyi …
Proxy re-encryption Scheme for IIoT using Algebraic Structure
S Venkatesan, JCM Alulema… - Journal of Survey …, 2023 - sifisheriessciences.com
With rapid advancement in wireless technology and pervasive digital technology have
provided in increasing popularity and interest of Internet Industrial of Things (IIoT) …
provided in increasing popularity and interest of Internet Industrial of Things (IIoT) …
[PDF][PDF] Efficient Digital Signature Scheme for Medical Information Systems Based on Non-Commutative Algebraic Structure
P Jayagowri - researchgate.net
The telecare medical information system (TMIS) aims to establish telecare services and
enable the public to access medical services or medical information at remote sites …
enable the public to access medical services or medical information at remote sites …