The Social Area networking Platform (S ANP) is a rapidly developing technology that allows users to meet friends, family, and others, who share their interests and express their personal feelings. The potential privac...
详细信息
Human detection in aerial images is incredibly challenging because of the characteristics aerial images possess. One of the main applications of human detection in aerial images is for search and rescue operations aft...
详细信息
The prerequisite for implementing incentive mechanisms and reliable participant selection schemes in federated learning is to obtain the contribution of each participant. Available evaluation methods for participant c...
详细信息
With the expansion of modern technologies and the Internet of Things (IoT), the concept of smart homes has gained tremendous popularity with a view to making people’s lives easier by ensuring a secured environment. S...
详细信息
With the increase in the number of vehicles on our roads, the number of road accidents is also increased drastically. One of the major reasons found for this mishappening is driver fatigue. By this proposed system, th...
详细信息
Machine-to-machine (M2M) communication networks consist of resource-constrained autonomous devices, also known as autonomous Internet of things (IoTs) or machine-type communication devices (MTCDs) which act as a backb...
详细信息
Machine-to-machine (M2M) communication networks consist of resource-constrained autonomous devices, also known as autonomous Internet of things (IoTs) or machine-type communication devices (MTCDs) which act as a backbone for Industrial IoT, smart cities, and other autonomous systems. Due to the limited computing and memory capacity, these devices cannot maintain strong security if conventional security methods are applied such as heavy encryption. This article proposed a novel lightweight mutual authentication scheme including elliptic curve cryptography (ECC) driven end-to-end encryption through curve25519 such as (i): efficient end-to-end encrypted communication with pre-calculation strategy using curve25519;and (ii): elliptic curve Diffie-Hellman (ECDH) based mutual authentication technique through a novel lightweight hash function. The proposed scheme attempts to efficiently counter all known perception layer security threats. Moreover, the pre-calculated key generation strategy resulted in cost-effective encryption with 192-bit curve security. It showed comparative efficiency in key strength, and curve strength compared with similar authentication schemes in terms of computational and memory cost, communication performance and encryption robustness.
Leukemia, a prevalent hematological malignancy, presents significant challenges in diagnosis and classification. Traditional diagnostic methods, often reliant on microscopic examination, suffer from subjectivity and i...
详细信息
Disease detection using iris recognition technology has emerged as a transformative paradigm in the realm of healthcare diagnostics. Leveraging the intricate patterns within the iris, this study explores the developme...
详细信息
The recent pandemic, covid-19 has largely affected people’s lives, health, and productivity. The first case of Covid-19 was recorded on December 31, 2019, in Wuhan, China. Since then, the number of cases has increase...
详细信息
The global elderly population is on the rise, posing significant challenges in both developed and developing nations. These challenges include issues related to mobility, falls, and the performance of daily tasks. How...
详细信息
暂无评论