Product sales anticipation assumes a key part in upgrading idealness of item conveyance in E-Commerce. Among numerous heterogeneous provisions pertinent to sales estimating, advancement crusades held in E-Commerce and...
详细信息
Underwater optical signal detection performance suffers from occlusion and turbidity in degraded environments. Due to complex underwater environment the high directionality of light beam and vibration transceiver inci...
详细信息
The study aims to enhance the management and monitoring of photovoltaic (PV) construction sites, which are often located in remote areas with challenging conditions. Traditional monitoring methods are inefficient, cos...
详细信息
Nowadays, coronary heart disease is one of the most fatal disease globally. Many researchers and medical technicians have developed and designed various computer-aided diagnosis systems using various machine learning ...
详细信息
Machine-to-machine (M2M) communication networks consist of resource-constrained autonomous devices, also known as autonomous Internet of things (IoTs) or machine-type communication devices (MTCDs) which act as a backb...
详细信息
Machine-to-machine (M2M) communication networks consist of resource-constrained autonomous devices, also known as autonomous Internet of things (IoTs) or machine-type communication devices (MTCDs) which act as a backbone for Industrial IoT, smart cities, and other autonomous systems. Due to the limited computing and memory capacity, these devices cannot maintain strong security if conventional security methods are applied such as heavy encryption. This article proposed a novel lightweight mutual authentication scheme including elliptic curve cryptography (ECC) driven end-to-end encryption through curve25519 such as (i): efficient end-to-end encrypted communication with pre-calculation strategy using curve25519;and (ii): elliptic curve Diffie-Hellman (ECDH) based mutual authentication technique through a novel lightweight hash function. The proposed scheme attempts to efficiently counter all known perception layer security threats. Moreover, the pre-calculated key generation strategy resulted in cost-effective encryption with 192-bit curve security. It showed comparative efficiency in key strength, and curve strength compared with similar authentication schemes in terms of computational and memory cost, communication performance and encryption robustness.
Cloud computing is a collection of distributed storage Network which can provide various services and store the data in the efficient *** advantages of cloud computing is its remote access where data can accessed in r...
详细信息
Cloud computing is a collection of distributed storage Network which can provide various services and store the data in the efficient *** advantages of cloud computing is its remote access where data can accessed in real time using Remote Method Innovation(RMI).The problem of data security in cloud environment is a major concern since the data can be accessed by any time by any *** to the lack of providing the efficient security the cloud computing they fail to achieve higher performance in providing the efficient *** improve the performance in data security,the block chains are used for securing the data in the cloud ***,the traditional block chain technique are not suitable to provide efficient security to the cloud data stored in the *** this paper,an efficient user centric block level Attribute Based Encryption(UCBL-ABE)scheme is presented to provide the efficient security of cloud data in cloud *** proposed approach performs data transaction by employing the block *** proposed system provides efficient privacy with access control to the user access according to the behavior of cloud user using Data Level Access Trust(DLAT).Based on DLAT,the user access has been restricted in the cloud *** proposed protocol is implemented in real time using Java programming language and uses IBM *** implementation results justifies that the proposed system can able to provide efficient security to the data present in and cloud and also enhances the cloud performance.
Swelling urban population and increasing the number of vehicles with finite road capacity account for a major section of air pollution in cities and towns, causing problems like the smog that lead to serious health is...
详细信息
Malware continues to be the largest issue that Internet users confront in the modern world. Polymorphism is one of this kind of malware's characteristics. Malware that continuously alters its distinguishing featur...
详细信息
Post-millennium has seen advent of use of social media in people with sharing articles and interaction. Social media has become an important source of information like news for people. Researchers have identified fake...
详细信息
With several applications in the disciplines of healthcare, human-computer interaction, assistive learning, and many others, Human Actions Recognition, or HAR, is a trending research area. Despite the fact that this f...
详细信息
暂无评论