A Blockchain assisted fog computing for secure distributed storage system for IoT Applications
With the rapid development of Internet of Things (IoT) devices, the volume of data generate
across various fields, such as smart healthcare, smart home, smart transportation has …
across various fields, such as smart healthcare, smart home, smart transportation has …
A blockchain based secure authentication technique for ensuring user privacy in edge based smart city networks
In the past decade, modernization of Information and Communication Technology (ICT),
Edge Computing (EC), and Smart Cities has attracted significant academic interest due to its …
Edge Computing (EC), and Smart Cities has attracted significant academic interest due to its …
Exploring the Use of Symmetric Encryption for Remote User-Authentication in Wireless Networks
Symmetric encryption is a cryptographic method used to provide facts security with
consumer-authentication within a Wi-Fi network. This paper explores using symmetric …
consumer-authentication within a Wi-Fi network. This paper explores using symmetric …
Deep Iot: A Deep Learning Model For Anomaly And Botnet Detection In Iot Networks
The Internet of Things (IoT) is currently transforming the world by connecting physical
objects to the Internet. However, as the number of connected devices and the growth of IoT …
objects to the Internet. However, as the number of connected devices and the growth of IoT …