Automation testing is essential to carry out functional testing quickly and precisely. Software testing is beneficial for testers doing many testing processes according to the existing scenarios. So, there is an urgen...
详细信息
Currently, the companies are required to have conducting business activities and continue constantly in touch with its customers to provide IT service availability continuously. The systems must be available at all ti...
详细信息
Internet of Things(IoT)applications can be found in various industry areas,including critical infrastructure and healthcare,and IoT is one of several technological *** a result,tens of billions or possibly hundreds of...
详细信息
Internet of Things(IoT)applications can be found in various industry areas,including critical infrastructure and healthcare,and IoT is one of several technological *** a result,tens of billions or possibly hundreds of billions of devices will be linked *** smart devices will be able to gather data,process it,and even come to decisions on their *** is the most essential thing in these *** IoT infrastructure,authenticated key exchange systems are crucial for preserving client and data privacy and guaranteeing the security of data-in-transit(e.g.,via client identification and provision of secure communication).It is still challenging to create secure,authenticated key exchange *** majority of the early authenticated key agreement procedure depended on computationally expensive and resource-intensive pairing,hashing,or modular exponentiation *** focus of this paper is to propose an efficient three-party authenticated key exchange procedure(AKEP)using Chebyshev chaotic maps with client anonymity that solves all the problems mentioned *** proposed three-party AKEP is protected from several *** proposed three-party AKEP can be used in practice for mobile communications and pervasive computing applications,according to statistical experiments and low processing *** protect client identification when transferring data over an insecure public network,our three-party AKEP may also offer client ***,the presented procedure offers better security features than the procedures currently available in the literature.
Every enterprise stores and operates its transactions confidentially, therefore it has to encrypt the transaction to protect it from data intruders. Technically, most encryption processes are ranging from hundreds of ...
详细信息
Evaluation of cryptocurrency's performance is performed questionably. There is no role for computer-model, make such an evaluation process does not have guidance. In this study, a simple decision support model (DS...
详细信息
Refasctoring is a technique used in software development to improve the quality of code without changing its functionality. One metric that is often used to measure code quality is Code Coverage. This study aims to ex...
详细信息
Automatic Speech Recognition (ASR) is useful for converting speech into text. ASR is needed to display automatic subtitles on movies or when conducting video conferencing. The use of deep learning in ASR applications ...
详细信息
Traffic Violation Detection system using radio frequency identification (RFID) has been applied to detect vehicles with limited power sources through RFID Tag. Camera sensors are also applied to identify a vehicle and...
详细信息
As e-commerce that covered all Indonesia, needs a fast reporting system to analyze the business to make the best decision. This paper provides methods to fasten the reporting process by making a data warehouse using K...
详细信息
Rising cyber risks have compelled organizations to adopt better cyber-protection measures. This study focused on discovering crucial security metrics and assessing the function of red teaming in enhancing cybersecurit...
详细信息
暂无评论