Search

Your search keyword '"Key generation"' showing total 14 results

Search Constraints

Start Over You searched for: Descriptor "Key generation" Remove constraint Descriptor: "Key generation" Journal cluster computing Remove constraint Journal: cluster computing
14 results on '"Key generation"'

Search Results

1. Deep learning with metaheuristics based data sensing and encoding scheme for secure cyber physical sensor systems.

2. An efficient data transmission approach using IAES-BE.

3. A lightweight physical-layer based security strategy for Internet of things.

4. A fully homomorphic–elliptic curve cryptography based encryption algorithm for ensuring the privacy preservation of the cloud data.

5. Fuzzy enhanced secure multicast routing for improving authentication in MANET.

6. An efficient data transmission approach using IAES-BE

7. Elliptic curve Diffie–Hellman cryptosystem in big data cloud security

8. A fully homomorphic–elliptic curve cryptography based encryption algorithm for ensuring the privacy preservation of the cloud data

9. A lightweight physical-layer based security strategy for Internet of things

10. Centralized cloud information accountability with bat key generation algorithm (CCIA-BKGA) framework in cloud computing environment

11. Fuzzy enhanced secure multicast routing for improving authentication in MANET

12. Augmented lightweight security scheme with access control model for wireless medical sensor networks

13. Energy efficient key agreement scheme for ubiquitous and continuous remote healthcare systems using data mining technique

14. Availability analysis and case study of mobile-OTP key generation using skip sampling of voice

Catalog

Books, media, physical & digital resources