Reversible cellular automata based cryptosystem
The increasing reliance on telecommunication technologies across various domains has
raised concerns surrounding data security and privacy during transmission. In response to …
raised concerns surrounding data security and privacy during transmission. In response to …
Transmission Line Fault Detection and Classification Based on Improved YOLOv8s
H Qiang, Z Tao, B Ye, R Yang, W Xu - Electronics, 2023 - mdpi.com
Transmission lines are an important component of the power grid, while complex natural
conditions can cause fault and delayed maintenance, which makes it quite important to …
conditions can cause fault and delayed maintenance, which makes it quite important to …
A Review on IoTs Applications and Security Threats via Data Transfer over Networks
BM Radhi, MA Hussain, ZA Abduljabbar… - Computer Science On …, 2024 - Springer
The concept of the “Internet of Things,” which states that everything is connected to
everything else and that everything interacts with everything else, is a fascinating …
everything else and that everything interacts with everything else, is a fascinating …
SEAF-IoD: Secure and efficient user authentication framework for the Internet of Drones
Abstract The Internet of Drones (IoD) stands as a rapidly advancing technology, finding
applications across civilian, military, and industrial domains, facilitating the efficient …
applications across civilian, military, and industrial domains, facilitating the efficient …
[HTML][HTML] Lightweight Scheme for Secure Signaling and Data Exchanges in Intelligent Precision Agriculture
Intelligent precision agriculture incorporates a number of Internet of Things (IoT) devices and
drones to supervise agricultural activities and surroundings. The collected data are then …
drones to supervise agricultural activities and surroundings. The collected data are then …
[HTML][HTML] Elliptic Curve Cryptography-Based Identity Authentication Scheme Suitable for Metaverse Environment
H Zhai, M Deng, H Wu - Symmetry, 2024 - mdpi.com
Compared to traditional platform environments in the online realm, the metaverse, as a three-
dimensional (3D) virtual world, exposes more identity data to the network. Once these data …
dimensional (3D) virtual world, exposes more identity data to the network. Once these data …
Cryptanalysis in e-commerce: A novel arrangement procedure using DHEC-SAT upon elliptic curve cryptography
Fauziyah, Z Wang - Multimedia Tools and Applications, 2024 - Springer
Cryptanalytic innovations are considered the most economical and useful method for
guaranteeing information security across shared networks. Despite the tinier key magnitude …
guaranteeing information security across shared networks. Despite the tinier key magnitude …
[PDF][PDF] Securing the skies: A comprehensive survey on internet of drones security challenges and solutions
OO Felix - architecture, 2023 - researchgate.net
The rapid proliferation of Unmanned Aerial Vehicles (UAVs) in the Internet of Things (IoT)
era has given rise to the Internet of Drones (IoD), introducing a myriad of security …
era has given rise to the Internet of Drones (IoD), introducing a myriad of security …
[PDF][PDF] Transmission Line Fault Detection and Classification Based on Improved YOLOv8s. Electronics 2023, 12, 4537
H Qiang, Z Tao, B Ye, R Yang, W Xu - 2023 - pdfs.semanticscholar.org
Transmission lines are an important component of the power grid, while complex natural
conditions can cause fault and delayed maintenance, which makes it quite important to …
conditions can cause fault and delayed maintenance, which makes it quite important to …