Results 201 to 210 of about 34,780 (224)

Efficient Energy Consumption of IoT Network Security Based on Symmetric and Asymmetric Cryptography and Hash Function

open access: closed
Mohammed Sbai El Idrissi   +3 more
openalex   +1 more source

Demystifying IoT Security: An Exhaustive Survey on IoT Vulnerabilities and a First Empirical Look on Internet-Scale IoT Exploitations

IEEE Communications Surveys and Tutorials, 2019
Elias Bou-harb   +2 more
exaly  

Advances in optical security systems

Advances in Optics and Photonics, 2014
Wen Chen, Bahram Javidi, Xudong Chen
exaly  

Chemical Sniffing Instrumentation for Security Applications

Chemical Reviews, 2016
Stamatios Giannoukos   +2 more
exaly  

Cryptographic hash functions: recent design trends and security notions

open access: closed, 2011
Saif Al‐Kuwari   +2 more
openalex  

Android Security: A Survey of Issues, Malware Penetration, and Defenses

IEEE Communications Surveys and Tutorials, 2015
Mauro Conti, Parvez Faruki, Vijay Laxmi
exaly  

Efficient Authentication Protocol Using Cryptographic Hash Function & LSB Dynamic Hop Image Steganographic Technique for Secure Communication

International Conference on Recent Trends in Engineering, Science & Technology - (ICRTEST 2016), 2016
D.S.R. Murthy, B. Madhuravani
openaire   +2 more sources

Home - About - Disclaimer - Privacy