Energy conservation in WSN: A review of current techniques

A Kumar, P Dadheech… - 2020 3rd International …, 2020 - ieeexplore.ieee.org
WSN is defined as the group of sensor nodes which has the ability to sense various
environmental parameters. It has limitation in ranges. The sensor nodes present in the …

Evolution of quantum cryptography in response to the computational power of quantum computers: an archival view

P Sharma, V Gupta, SK Sood - Archives of Computational Methods in …, 2024 - Springer
Quantum cryptography (QC), rooted in the principles of quantum mechanics, stands as a
beacon of security, offering an unparalleled level of protection against quantum attacks. This …

Quantum resilience and distributed trust: The promise of blockchain and quantum computing in defense

S Akhai, V Kumar - … Security Practices Using Blockchain, Quantum and …, 2024 - Springer
The combination of blockchain technology with quantum computing has opened up new
doors for improving the safety and effectiveness of a diverse variety of business sectors. The …

[HTML][HTML] Mutual authentication of nodes using session token with fingerprint and MAC address validation

AK Bairwa, S Joshi - Egyptian Informatics Journal, 2021 - Elsevier
Security has become an important issue during communication among mobile nodes in an
unfavorable condition. The mobile node's property is dynamic, so it isn't easy to manage …

Detection and classification of Covid-19 in CT-lungs screening using machine learning techniques

OR Shahin, RM Abd El-Aziz… - Journal of Interdisciplinary …, 2022 - Taylor & Francis
In this study, machine learning is used to detect coronavirus in CT-lung screening. This virus
causes serious acute respiratory illness and is very contagious. The WHO has confirmed 19 …

Multi-class SVM based network intrusion detection with attribute selection using infinite feature selection technique

R Kaushik, V Singh, R Kumari - Journal of Discrete Mathematical …, 2021 - Taylor & Francis
An intrusion detection mechanism is a software program or a device that monitors the
network and provides information about any suspicious activity. This paper proposes a multi …

Multiple watermarking scheme for video & image for authentication & copyright protection

N Janu, A Kumar, P Dadheech, G Sharma… - IOP conference …, 2021 - iopscience.iop.org
Watermarking has been used frequently to authenticate the accuracy and security of the
image and video files. In the world of computer technology, several watermarking strategies …

A secure and efficient data migration over cloud computing

GM Rao, K Srinivas, S Samee… - IOP Conference …, 2021 - iopscience.iop.org
Migrations are complex and depend on the project and its requirements, so security is
essential to ensure a safe migration to the cloud. There are many things to consider, such as …

A fuzzy ISM analysis of factors in growth of initial coin offerings (ICOs)

S Kumar, N Janu, L Raja, A Kumar - Journal of Interdisciplinary …, 2022 - Taylor & Francis
In the previous few years, the value of cryptocurrencies and their market capitalization have
grown at an incredibly rapid pace. There are currently over 1500 distinct trading currencies …

Retracted: Performance study of snort and suricata for intrusion detection system

NV Sharma, G Aggarwal, S Sharma - IOP Conference Series …, 2021 - iopscience.iop.org
As of late, move to multitasking processors and thus applications using multithreaded
structure has increased in an abrupt manner. There is a constant thought of using Network …