"Development of platform using NIOS II soft core processor for image...
S. V. Trivedi, M. A. Hasamnis. 2015. "Development of platform using NIOS II soft core processor for image encryption and decryption using AES algorithm". 2015 International Conference on...
View Article"VLSI implementation of BER measurement for wireless communication system"
R. Saravanan, V. Saminadan, V. Thirunavukkarasu. 2015. "VLSI implementation of BER measurement for wireless communication system". 2015 International Conference on Innovations in Information,...
View ArticleEnhancing data security of iOS client by encryption algorithm
Shen, Y., Wang, H.. 2017. Enhancing data security of iOS client by encryption algorithm. 2017 IEEE 2nd Advanced Information Technology, Electronic and Automation Control Conference (IAEAC). :366–370.
View ArticleA Hybrid Routing Algorithm for Secure Environmental Monitoring System in WSN
Nandhini, M., Priya, P.. 2017. A Hybrid Routing Algorithm for Secure Environmental Monitoring System in WSN. 2017 International Conference on Communication and Signal Processing (ICCSP). :1061–1065.
View ArticlePVad: Privacy-Preserving Verification for Secure Routing in Ad Hoc Networks
Li, T., Ma, J., Sun, C., Wei, D., Xi, N.. 2017. PVad: Privacy-Preserving Verification for Secure Routing in Ad Hoc Networks. 2017 International Conference on Networking and Network Applications...
View ArticleFoVLC: Foveation Based Data Hiding in Display Transmitters for Visible Light...
Yildiz, O., Gulbahar, B.. 2018. FoVLC: Foveation Based Data Hiding in Display Transmitters for Visible Light Communications. 2018 14th International Wireless Communications Mobile Computing...
View ArticleOptical Wireless Interception Vulnerability Analysis of Visible Light...
Lian, J., Wang, X., Noshad, M., Brandt-Pearce, M.. 2018. Optical Wireless Interception Vulnerability Analysis of Visible Light Communication System. 2018 IEEE International Conference on...
View ArticleState Estimation Based Energy Theft Detection Scheme with Privacy...
Wen, M., Yao, D., Li, B., Lu, R.. 2018. State Estimation Based Energy Theft Detection Scheme with Privacy Preservation in Smart Grid. 2018 IEEE International Conference on Communications (ICC). :1-6.
View ArticleA secure data aggregation protocol for fog computing based smart grids
Okay, F. Y., Ozdemir, S.. 2018. A secure data aggregation protocol for fog computing based smart grids. 2018 IEEE 12th International Conference on Compatibility, Power Electronics and Power...
View ArticlePerformance Analysis of Symmetric Key Cryptographic Algorithms
Vyakaranal, S., Kengond, S.. 2018. Performance Analysis of Symmetric Key Cryptographic Algorithms. 2018 International Conference on Communication and Signal Processing (ICCSP). :0411–0415.
View ArticleA Lightweight Compound Defense Framework Against Injection Attacks in IIoT
Chi, Po-Wen, Wang, Ming-Hung. 2018. A Lightweight Compound Defense Framework Against Injection Attacks in IIoT. 2018 IEEE Conference on Dependable and Secure Computing (DSC). :1–8.
View ArticleDouble Encryption Using TEA and DNA
P.G., Swathi, Rajesh, Sreeja. 2018. Double Encryption Using TEA and DNA. 2018 International Conference on Circuits and Systems in Digital Enterprise Technology (ICCSDET). :1-5.
View ArticleResearch on Self-Healing Technology for Faults of Intelligent Distribution...
Liu, Xiaobao, Wu, Qinfang, Sun, Jinhua, Xu, Xia, Wen, Yifan. 2019. Research on Self-Healing Technology for Faults of Intelligent Distribution Network Communication System. 2019 IEEE 3rd Information...
View ArticleA Secure Autonomic Mobile Ad-Hoc Network Based Trusted Routing Proposal
Dhanya, K., Jeyalakshmi, C., Balakumar, A.. 2019. A Secure Autonomic Mobile Ad-Hoc Network Based Trusted Routing Proposal. 2019 International Conference on Computer Communication and Informatics...
View ArticleSelection Mechanism for Underwater Multi-Media Communication
Ko, Eunbi, M, Delphin Raj K, Yum, Sun-Ho, Shin, Soo-Young, Namgung, Jung-Il, Park, Soo-Hyun. 2019. Selection Mechanism for Underwater Multi-Media Communication. 2019 International Conference on...
View ArticleA Simultaneous Approach for Compression and Encryption Techniques Using...
Zebari, Dilovan Asaad, Haron, Habibollah, Zeebaree, Diyar Qader, Zain, Azlan Mohd. 2019. A Simultaneous Approach for Compression and Encryption Techniques Using Deoxyribonucleic Acid. 2019 13th...
View ArticleA highly accurate machine learning approach for developing wireless sensor...
Alshinina, Remah, Elleithy, Khaled. 2018. A highly accurate machine learning approach for developing wireless sensor network middleware. 2018 Wireless Telecommunications Symposium (WTS). :1–7.
View ArticleApplication of Bit Interleaving to Convolutional Codes for Short Packet...
Wang, Meng, Zhan, Ming, Yu, Kan, Deng, Yi, Shi, Yaqin, Zeng, Jie. 2019. Application of Bit Interleaving to Convolutional Codes for Short Packet Transmission. 2019 IEEE International Conference on...
View ArticleData Management Portfolio for Improvement of Privacy in Fog-to-cloud...
Chertchom, Prajak, Tanimoto, Shigeaki, Konosu, Tsutomu, Iwashita, Motoi, Kobayashi, Toru, Sato, Hiroyuki, Kanai, Atsushi. 2019. Data Management Portfolio for Improvement of Privacy in Fog-to-cloud...
View ArticleSecured Fine-Grained Selective Access to Outsourced Cloud Data in IoT...
Xia, Qi, Sifah, Emmanuel Boateng, Obour Agyekum, Kwame Opuni-Boachie, Xia, Hu, Acheampong, Kingsley Nketia, Smahi, Abla, Gao, Jianbin, Du, Xiaojiang, Guizani, Mohsen. 2019. Secured Fine-Grained...
View ArticleOn the Large-Scale Traffic DDoS Threat of Space Backbone Network
Di, A., Ruisheng, S., Lan, L., Yueming, L.. 2019. On the Large-Scale Traffic DDoS Threat of Space Backbone Network. 2019 IEEE 5th Intl Conference on Big Data Security on Cloud (BigDataSecurity), IEEE...
View ArticleMediating Data Trustworthiness by Using Trusted Hardware between IoT Devices...
Enkhtaivan, B., Inoue, A.. 2020. Mediating Data Trustworthiness by Using Trusted Hardware between IoT Devices and Blockchain. 2020 IEEE International Conference on Smart Internet of Things...
View ArticleAn Empirical Evaluation of GDPR Compliance Violations in Android mHealth Apps
Fan, M., Yu, L., Chen, S., Zhou, H., Luo, X., Li, S., Liu, Y., Liu, J., Liu, T.. 2020. An Empirical Evaluation of GDPR Compliance Violations in Android mHealth Apps. 2020 IEEE 31st International...
View ArticleSignature Image Hiding in Color Image using Steganography and Cryptography...
Pramanik, S., Bandyopadhyay, S. K., Ghosh, R.. 2020. Signature Image Hiding in Color Image using Steganography and Cryptography based on Digital Signature Concepts. 2020 2nd International Conference...
View ArticleSynergetic Denial-of-Service Attacks and Defense in Underwater Named Data...
Li, Y., Liu, Y., Wang, Y., Guo, Z., Yin, H., Teng, H.. 2020. Synergetic Denial-of-Service Attacks and Defense in Underwater Named Data Networking. IEEE INFOCOM 2020 - IEEE Conference on Computer...
View ArticleA Secure Transmission Scheme Based on Efficient Transmission Fountain Code
Chai, L., Ren, P., Du, Q.. 2020. A Secure Transmission Scheme Based on Efficient Transmission Fountain Code. 2020 IEEE/CIC International Conference on Communications in China (ICCC). :600–604.
View ArticlePrivacy and Security of IoT based Skin Monitoring System using Blockchain...
Juyal, S., Sharma, S., Harbola, A., Shukla, A. S.. 2020. Privacy and Security of IoT based Skin Monitoring System using Blockchain Approach. 2020 IEEE International Conference on Electronics,...
View ArticleResearch on Data Transmission Security Architecture Design and Process
Maalla, Allam. 2020. Research on Data Transmission Security Architecture Design and Process. 2020 IEEE International Conference on Information Technology,Big Data and Artificial Intelligence (ICIBA)....
View ArticleImage Encryption Using Chaotic Map And Related Analysis
Pradeep, Diya Achu, Harsha, A, Jacob, Jaison. 2021. Image Encryption Using Chaotic Map And Related Analysis. 2021 International Conference on Advances in Computing and Communications (ICACC). :1—5.
View ArticleMuSigRDT: MultiSig Contract based Reliable Data Transmission in Social...
Naik, Badavath Shravan, Tripathy, Somanath, Mohanty, Susil Kumar. 2022. MuSigRDT: MultiSig Contract based Reliable Data Transmission in Social Internet of Vehicle. GLOBECOM 2022 - 2022 IEEE Global...
View Article
More Pages to Explore .....