Zobrazeno 1 - 10
of 16
pro vyhledávání: '"M. Amutha Prabakar"'
Publikováno v:
Cloud IoT Systems for Smart Agricultural Engineering ISBN: 9781003185413
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::26f7200ac985e82053b33233cd89a248
https://doi.org/10.1201/9781003185413-14
https://doi.org/10.1201/9781003185413-14
Publikováno v:
Materials Today: Proceedings.
Wearable sensors for activity recognition can give a response to the person about their daily life concerning sports physical activity. Moreover, it encourages a more active lifestyle. Mostly, supervised laboratory settings are used to study activity
Publikováno v:
Advances in Intelligent Systems and Computing ISBN: 9789811501982
The menace of attackers over the network is unstoppable for the past two decades. The security practitioners and researchers are devising mechanisms to safeguard the network and its components, but still attackers emerge with cutting edge technologie
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::d5b203455dad41928781e18815ad28d3
https://doi.org/10.1007/978-981-15-0199-9_4
https://doi.org/10.1007/978-981-15-0199-9_4
Autor:
M. Amutha Prabakar, Syed Amma Sheik
Publikováno v:
International Journal of Information and Computer Security. 16:207
Smart card-based authentication schemes play an important role in remote system access and provide a secure method for resource sharing. Over the past two decades, many password-based authenticatio...
Autor:
R. Niranchana, M. Amutha Prabakar
Publikováno v:
International Journal of Internet Technology and Secured Transactions. 11:1
The best solution to perform remote authentication verification is offered by the authentication scheme that opts a smart card. Such schemes are developed by using the combination of password and biometric identity. Biometric-based authentication sch
Autor:
R. Niranchana, M. Amutha Prabakar
Publikováno v:
International Journal of Internet Technology and Secured Transactions. 11:470
Publikováno v:
2017 International Conference on Intelligent Computing, Instrumentation and Control Technologies (ICICICT).
Publikováno v:
2006 International Symposium on Ad Hoc and Ubiquitous Computing.
Privacy is needed in adhoc networks. A secured on demand position based private routing algorithm is proposed for communication anonymity and provide a security in mobile adhoc network. Here we use cryptography algorithm for providing security to pre
Publikováno v:
International Journal of Communication Networks and Distributed Systems. 3:384
Elliptic curve cryptography (ECC) provides a secure means of exchanging keys among communicating hosts using the Diffie Hellman key exchange algorithm. Encryption and decryption of texts and messages have also been attempted. This paper presents the
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.