[1]
|
Symmetric and Asymmetric Cryptographic Approach based Security Protocol for Key Exchange
2023 International Conference on Applied Intelligence and Sustainable Computing (ICAISC),
2023
DOI:10.1109/ICAISC58445.2023.10200989
|
|
|
[2]
|
ATCA Multi-Node Management System Protocol Optimization
Integrated Ferroelectrics,
2023
DOI:10.1080/10584587.2023.2192679
|
|
|
[3]
|
Symmetric and Asymmetric Cryptographic Approach based Security Protocol for Key Exchange
2023 International Conference on Applied Intelligence and Sustainable Computing (ICAISC),
2023
DOI:10.1109/ICAISC58445.2023.10200989
|
|
|
[4]
|
An Integrated Framework for Location Based Security in Cloud Environment using Multi Objective Optimization (ILBS-MOO)
2023 IEEE 3rd Mysore Sub Section International Conference (MysuruCon),
2023
DOI:10.1109/MysuruCon59703.2023.10396876
|
|
|
[5]
|
IoT Based Control Networks and Intelligent Systems
Lecture Notes in Networks and Systems,
2023
DOI:10.1007/978-981-19-5845-8_32
|
|
|
[6]
|
Advanced Communication and Intelligent Systems
Communications in Computer and Information Science,
2023
DOI:10.1007/978-3-031-25088-0_25
|
|
|
[7]
|
Optimization of AES-128 Encryption Algorithm for Security Layer in ZigBee Networking of Internet of Things
Computational Intelligence and Neuroscience,
2022
DOI:10.1155/2022/8424100
|
|
|
[8]
|
A Novel Integrated IoT Framework with Classification Approach for Medical Data Analysis
2022 9th International Conference on Computing for Sustainable Global Development (INDIACom),
2022
DOI:10.23919/INDIACom54597.2022.9763297
|
|
|
[9]
|
Design and validation of CAN protocol with enhanced Security in electric vehicle
2021 5th International Conference on Computing Methodologies and Communication (ICCMC),
2021
DOI:10.1109/ICCMC51019.2021.9418436
|
|
|
[10]
|
Node-Node Data Exchange in IoT Devices Using Twofish and DHE
Advances in Science, Technology and Engineering Systems Journal,
2021
DOI:10.25046/aj060271
|
|
|
[11]
|
A comprehensive performance empirical study of the symmetric algorithms:AES, 3DES, Blowfish and Twofish
2021 International Conference on Information Technology (ICIT),
2021
DOI:10.1109/ICIT52682.2021.9491644
|
|
|
[12]
|
Network Security Threat Situation Recognition Based on Attack and Defense Game Model
Journal of Physics: Conference Series,
2021
DOI:10.1088/1742-6596/2037/1/012126
|
|
|
[13]
|
Application of AES and DES Algorithms in File Management
Journal of Physics: Conference Series,
2021
DOI:10.1088/1742-6596/2037/1/012001
|
|
|
[14]
|
Design and Validation of CAN Protocol with Double Encryption for Electric Vehicle Applications
2021 International Conference on Advancements in Electrical, Electronics, Communication, Computing and Automation (ICAECA),
2021
DOI:10.1109/ICAECA52838.2021.9675527
|
|
|
[15]
|
ECG Encryption Enhancement Technique with Multiple Layers of AES and DNA Computing
Intelligent Automation & Soft Computing,
2021
DOI:10.32604/iasc.2021.015129
|
|
|
[16]
|
An Analysis of Various IoT Security Techniques: A Review
2020 8th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO),
2020
DOI:10.1109/ICRITO48877.2020.9198027
|
|
|
[17]
|
Advances in Electrical and Computer Technologies
Lecture Notes in Electrical Engineering,
2020
DOI:10.1007/978-981-15-5558-9_36
|
|
|