Current research trends in IoT security: a systematic mapping study
JY Lee, J Lee - Mobile Information Systems, 2021 - Wiley Online Library
The smart mobile Internet‐of‐things (IoT) network lays the foundation of the fourth industrial
revolution, the era of hyperconnectivity, hyperintelligence, and hyperconvergence. As this …
revolution, the era of hyperconnectivity, hyperintelligence, and hyperconvergence. As this …
Survey on Cloud Auditing by Using Integrity Checking Algorithm and Key Validation Mechanism
M Mageshwari, R Naresh - Smart Trends in Computing and …, 2022 - Springer
Cloud computing can be used to access and storing data and delivery of different services
over the internet. Using cloud storage, users can remotely store their data. Cloud service …
over the internet. Using cloud storage, users can remotely store their data. Cloud service …
A survey on mobile payment request verification over cloud using key distribution
Payment request examination of some of the cryptography's most widely used encryption
algorithms, with the goal of first identifying as many flaws and vulnerabilities as possible …
algorithms, with the goal of first identifying as many flaws and vulnerabilities as possible …
Decentralized data privacy protection and cloud auditing security management
M Mageshwari, R Naresh - 2022 International Conference on …, 2022 - ieeexplore.ieee.org
Decentralized data protection is becoming more important as more firms employ Cloud
resources. Securing, protecting, and processing user data are primary issues that Cloud …
resources. Securing, protecting, and processing user data are primary issues that Cloud …
The WhatsApp Based Cost-Effective Automation at Homes through Internet of Things
S Mohanraj, J Karthi, N Sridevi… - … on Smart Structures …, 2023 - ieeexplore.ieee.org
This paper highlights the necessity for using lowcost methods in automating household
appliances. Internet of Things (IoT) is the well-known technology for connecting devices over …
appliances. Internet of Things (IoT) is the well-known technology for connecting devices over …
An improvised machine learning approach for wireless Sensor-Based healthcare applications
V Bharathi, CNS Vinoth Kumar - Mobile Computing and Sustainable …, 2022 - Springer
Abstract Medical Cyber-Physical Systems, health cloud, the Internet of Health Things (IoHT),
perceptive algorithms, block chain, big data analytics, health fog, and machine learning are …
perceptive algorithms, block chain, big data analytics, health fog, and machine learning are …
Validate Merchant Server for secure payment using Key Distribution
Nowadays, growing and competitiveness of a financial sector and e-healthcare application
developed rapidly and quicker ever so that mobile payment plays a vital role to make easier …
developed rapidly and quicker ever so that mobile payment plays a vital role to make easier …
[PDF][PDF] Mobile ad hoc networks intrusion detection in co-operative motion.
K Pazhanisamy, L Parthiban - 2021 - alinteridergisi.com
As the number of wireless devices continues to increase rapidly, mobile ad hoc networking
(MANET) has emerged as an exciting and significant technological advance. MANETs were …
(MANET) has emerged as an exciting and significant technological advance. MANETs were …