Search Result "Diffie-Hellman"
Offline E-Payment System Using Proxy Blind Signature Scheme
Journal: Recent Patents on Computer Science
Volume: 5 Issue: 2 Year: 2012 Page: 153-162
Author(s): Sattar J. Aboud
A Secure Reversible Data Hiding and Encryption System for Embedding EPR in Medical Images
Journal: Current Signal Transduction Therapy
Volume: 15 Issue: 2 Year: 2020 Page: 124-135
Author(s): Sonal Ayyappan,C. Lakshmi,Varun Menon
Energy Enhancement Techniques for Structure-Free Wireless Sensor Network with Encrypted Data
Journal: International Journal of Sensors, Wireless Communications and Control
Volume: 10 Issue: 3 Year: 2020 Page: 402-412
Author(s): Hussain K. Chaiel,Zainab S.M. Al-Husseini,Khaldun I. Arif
A Secure and Energy-efficient Framework for Air Quality PredictionUsing Smart Sensors and ISHO-DCNN
Journal: International Journal of Sensors, Wireless Communications and Control
Volume: 13 Issue: 3 Year: 2023 Page: 131-144
Author(s): Kamlesh Kumar Singh
Key Management Protocols for Secure Wireless Multimedia Services: A Review
Journal: Recent Patents on Telecommunication (Discontinued)
Volume: 1 Issue: 1 Year: 2012 Page: 41-53
Author(s): Mamoona Naveed Asghar,Martin Fleury,Mohammed Ghanbari
Security Algorithms For Cloud Computing
Ebook: New Age Cyber Threat Mitigation for Cloud Computing Networks
Volume: 1 Year: 2023
Author(s):
Doi: 10.2174/9789815136111123010005
An Intelligent Cryptographic Approach for Preserving the Privacy andSecurity of Smart Home IoT Applications
Journal: International Journal of Sensors, Wireless Communications and Control
Volume: 14 Issue: 3 Year: 2024 Page: 226-235
Author(s):
Nanorobots: Types, Principles and Application
Ebook: Robotics and Automation in Industry 4.0
Volume: 1 Year: 2024
Author(s): Santosh Kumar Das
Doi: 10.2174/9789815223491124010003
Emerging Technologies in Fintech: A Case Study
Ebook: Robotics and Automation in Industry 4.0
Volume: 1 Year: 2024
Author(s):
Doi: 10.2174/9789815223491124010008
An Efficient Software Anti-Piracy Scheme
Journal: Recent Patents on Computer Science
Volume: 3 Issue: 1 Year: 2010 Page: 67-76
Author(s): Sattar J. Aboud