[PDF][PDF] Optimal key handover management for enhancing security in mobile network
V Suma, W Haoxiang - Journal of trends in Computer Science …, 2020 - scholar.archive.org
The 3GPP long term Evolution or System Architecture Evolution (LTE/SAE) was designed for
the dispositioning of the mobile networks towards 4G. The significant hurdle of 4G is about …
the dispositioning of the mobile networks towards 4G. The significant hurdle of 4G is about …
An overview of IoT for smart healthcare technologies
RK Sidhu - 2023 International Conference on Computational …, 2023 - ieeexplore.ieee.org
The Internet of Things (IoT) is critical to the healthcare industry's fast automation. Healthcare
Internet of Things is the name given to the IoT branch dedicated to medical science (H-IoT) …
Internet of Things is the name given to the IoT branch dedicated to medical science (H-IoT) …
Security threats in healthcare big data: a comparative study
N Thapliyal, MS Gaur - 2023 International Conference on …, 2023 - ieeexplore.ieee.org
Big data refers to large, complex datasets that are generated by businesses, organizations,
and individuals in various sectors such as healthcare, finance, and government. These …
and individuals in various sectors such as healthcare, finance, and government. These …
Wireless Communication Security Breaches in Smart Healthcare Applications
S Srivastava, JN Singh - 2021 3rd International Conference on …, 2021 - ieeexplore.ieee.org
The growth of wireless sensor networks (WSNs) in smart healthcare is being driven by the
growing range of portable real time Health scanners and locator labels that can record the …
growing range of portable real time Health scanners and locator labels that can record the …
A review on ai-based techniques for tackling COVID-19
T Singh, R Khan, S Srivastava - Cyber Security in Intelligent Computing …, 2022 - Springer
Corona virus has affected the lives of people significantly due to its very high transmission
rate. It is a serious threat to human beings. Therefore, it has become quite a challenge for …
rate. It is a serious threat to human beings. Therefore, it has become quite a challenge for …
Handshake Comparison Between TLS V 1.2 and TLS V 1.3 Protocol
AP Singh, M Singh - Cyber Security in Intelligent Computing and …, 2022 - Springer
In the era of the digital world, network security has become an indispensable part of daily
routine life. The SSL/TLS is the fundamental communication protocol that utilized to provide …
routine life. The SSL/TLS is the fundamental communication protocol that utilized to provide …
A Review of Machine Learning Techniques (MLT) in Health Informatics
Healthcare informatics (HI) a multispectral field that has become synonymize with high-tech
upgrading. Health informatics (HI) means health aspects with the combination of technology …
upgrading. Health informatics (HI) means health aspects with the combination of technology …
The Mutation Study of Social Media in Student's Life
A Mishra, N Kumar Varun, S Srivastava… - … Intelligence and Data …, 2022 - Springer
This paper is studying distinct social media platforms and their ups and downs. This paper
calculates the different questionnaire on different ways about social media is destroying …
calculates the different questionnaire on different ways about social media is destroying …
Customized Transformer for Confident Browse Node Classification on Imbalanced Product Data
K Selvakumaran, A Sami… - 2023 International …, 2023 - ieeexplore.ieee.org
Rapid digitization of the world has revitalized the potential of AI. As a result, this
phenomenon awakened a huge demand for data-mining pipelines that can efficiently …
phenomenon awakened a huge demand for data-mining pipelines that can efficiently …
Review On Energy Efficiency Protocol In Wireless Sensor Network
S Srivastava, JN Singh - 2021 3rd International Conference on …, 2021 - ieeexplore.ieee.org
The research community has spent the last ten years focusing on resource data routing in
wireless communication. Sensor nodes have built a name for themselves in a number of …
wireless communication. Sensor nodes have built a name for themselves in a number of …