Zobrazeno 1 - 10
of 20
pro vyhledávání: '"Nistala V. E. S. Murthy"'
Publikováno v:
AIP Conference Proceedings.
Publikováno v:
AIP Conference Proceedings.
Publikováno v:
Information Security Journal: A Global Perspective. 29:1-13
In this paper, we propose a new protocol in which 2m2−1 session keys can be generated when m public keys are exchanged in a one run of the aforesaid protocol based on the difficulty of the hyper el...
Publikováno v:
Human-Centric Computing and Information Sciences, Vol 9, Iss 1, Pp 1-32 (2019)
Group key agreement protocol permits a set of users to create a common key to make sure security of information exchange among members of the group. It is extensively used in secure multiparty computation, resource security sharing, and distributed c
Publikováno v:
ESSENCE OF MATHEMATICS IN ENGINEERING APPLICATIONS: EMEA-2020.
In this paper, we introduce the notion of c-cover for the associated L-fuzzy point set of an L-fuzzy set and it is shown that the set of all c-covers o f t he associated L-fuzzy point se t is a pa rtially ordered se t. Fu rther, we es tablish a conne
Publikováno v:
Lecture Notes in Electrical Engineering ISBN: 9789811579608
Sentiment Classification is a continuing area of research in text mining. Sentiment Analysis the automatic representation of the ideas, emotions and subjectivity of text, whose purpose is to define the polarity of the content of text, and opinion of
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::6e2e57717b61f9848df05807e37305d2
https://doi.org/10.1007/978-981-15-7961-5_140
https://doi.org/10.1007/978-981-15-7961-5_140
Publikováno v:
Wireless Communications and Mobile Computing, Vol 2020 (2020)
Patient safety is a global public health concern nowadays, especially in elderly people who need physiological health monitoring systems integrated with a technology which will help to oversee and manage the medical needs. In this direction, we propo
Publikováno v:
Journal of Physics: Conference Series. 1767:012052
It is known that, for any L-fuzzy set X, there is an associated L-fuzzy point set, which is a crisp set. Further, for these sets X and, there are four associated objects of study, namely: the poset of L-fuzzy i-covers of X, the poset of L-fuzzy toler
Publikováno v:
International Journal of Intelligent Systems and Applications. 8:55-64
In this paper, we propose a proficient method for knowledge management in Edaphology to assist the edaphologists and those related with agriculture in a big way. The proposed method mainly consists two sections of which the first one is to build the
Publikováno v:
Security and Communication Networks. 9:1085-1102
This paper proposes a new two round authenticated contributory group key agreement (ACGKA) protocol based on elliptic curve Diffie–Hellman (ECDH) with integrated signature. In this technique, one node is picked up as the group controller, and this