Privacy preserving three-factor authentication protocol for secure message forwarding in wireless body area networks
VO Nyangaresi - Ad Hoc Networks, 2023 - Elsevier
Wireless body area networks have gained popularity due to their ability to enhance
efficiency, flexibility, convenience and the quality of life. In this environment, the patient …
efficiency, flexibility, convenience and the quality of life. In this environment, the patient …
Secure software design evaluation and decision making model for ubiquitous computing: A two-stage ANN-Fuzzy AHP approach
A Alzahrani, RA Khan - Computers in Human Behavior, 2024 - Elsevier
Ubiquitous computing systems are deployed everywhere to process and service complex
applications in real time. It has been noticed that most ubiquitous computing practitioners …
applications in real time. It has been noticed that most ubiquitous computing practitioners …
Energy efficient dynamic symmetric key based protocol for secure traffic exchanges in smart homes
Highly sensitive information about people's social life and daily activities flows in smart
home networks. As such, if attackers can manage to capture or even eavesdrop on this …
home networks. As such, if attackers can manage to capture or even eavesdrop on this …
An empirical study for mitigating sustainable cloud computing challenges using ISM-ANN
The significance of cloud computing methods in everyday life is growing as a result of the
exponential advancement and refinement of artificial technology. As cloud computing makes …
exponential advancement and refinement of artificial technology. As cloud computing makes …
[PDF][PDF] An extensive survey of smart agriculture technologies: Current security posture
M Otieno - World J. Adv. Res. Rev, 2023 - researchgate.net
Smart agriculture, enabled by advanced technologies such as internet of things, artificial
intelligence and data analytics, offers immense potential for optimizing farming practices and …
intelligence and data analytics, offers immense potential for optimizing farming practices and …
[CITATION][C] Assessment of existing cyber-attack detection models for web-based systems
OG Awuor - Global Journal of Engineering and Technology …, 2023
[CITATION][C] Techniques and protocols for enhancing data privacy in cloud computing: A review
M Otieno - World Journal of Advanced …, 2023 - World Journal of Advanced …
[CITATION][C] A comparative analysis of recurrent neural network and support vector machine for binary classification of spam short message service
D Odera, G Odiaga - World Journal …, 2023 - World Journal of Advanced …
[CITATION][C] Security challenges in cloud computing: A comprehensive analysis
JJ Ang'udi - World Journal of Advanced …, 2023 - World Journal of Advanced …
[CITATION][C] Safeguarding the future: A comprehensive analysis of security measures for smart grids
SA Wasumwa - World Journal of Advanced …, 2023 - World Journal of Advanced …