Reversible cellular automata based cryptosystem

GC Stănică, P Anghelescu - Electronics, 2024 - mdpi.com
The increasing reliance on telecommunication technologies across various domains has
raised concerns surrounding data security and privacy during transmission. In response to …

Transmission Line Fault Detection and Classification Based on Improved YOLOv8s

H Qiang, Z Tao, B Ye, R Yang, W Xu - Electronics, 2023 - mdpi.com
Transmission lines are an important component of the power grid, while complex natural
conditions can cause fault and delayed maintenance, which makes it quite important to …

A Review on IoTs Applications and Security Threats via Data Transfer over Networks

BM Radhi, MA Hussain, ZA Abduljabbar… - Computer Science On …, 2024 - Springer
The concept of the “Internet of Things,” which states that everything is connected to
everything else and that everything interacts with everything else, is a fascinating …

SEAF-IoD: Secure and efficient user authentication framework for the Internet of Drones

M Tanveer, A Aldosary, N Kumar, SA Aldossari - Computer Networks, 2024 - Elsevier
Abstract The Internet of Drones (IoD) stands as a rapidly advancing technology, finding
applications across civilian, military, and industrial domains, facilitating the efficient …

[HTML][HTML] Lightweight Scheme for Secure Signaling and Data Exchanges in Intelligent Precision Agriculture

TA Kadhim, ZA Abduljabbar, HAA AL-Asadi… - Cryptography, 2025 - mdpi.com
Intelligent precision agriculture incorporates a number of Internet of Things (IoT) devices and
drones to supervise agricultural activities and surroundings. The collected data are then …

[HTML][HTML] Elliptic Curve Cryptography-Based Identity Authentication Scheme Suitable for Metaverse Environment

H Zhai, M Deng, H Wu - Symmetry, 2024 - mdpi.com
Compared to traditional platform environments in the online realm, the metaverse, as a three-
dimensional (3D) virtual world, exposes more identity data to the network. Once these data …

Cryptanalysis in e-commerce: A novel arrangement procedure using DHEC-SAT upon elliptic curve cryptography

Fauziyah, Z Wang - Multimedia Tools and Applications, 2024 - Springer
Cryptanalytic innovations are considered the most economical and useful method for
guaranteeing information security across shared networks. Despite the tinier key magnitude …

[PDF][PDF] Securing the skies: A comprehensive survey on internet of drones security challenges and solutions

OO Felix - architecture, 2023 - researchgate.net
The rapid proliferation of Unmanned Aerial Vehicles (UAVs) in the Internet of Things (IoT)
era has given rise to the Internet of Drones (IoD), introducing a myriad of security …

[PDF][PDF] Transmission Line Fault Detection and Classification Based on Improved YOLOv8s. Electronics 2023, 12, 4537

H Qiang, Z Tao, B Ye, R Yang, W Xu - 2023 - pdfs.semanticscholar.org
Transmission lines are an important component of the power grid, while complex natural
conditions can cause fault and delayed maintenance, which makes it quite important to …

[인용][C] Privacy and security issues surrounding vehicular Adhoc networks

E Asituha - World Journal of Advanced …, 2023 - World Journal of Advanced …