Zobrazeno 1 - 10
of 10
pro vyhledávání: '"SK Khaja Shareef"'
Autor:
SK Khaja Shareef, R. Krishna Chaitanya, Srinivasulu Chennupalli, Devi Chokkakula, K. V. D. Kiran, Udayaraju Pamula, Ramesh Vatambeti
Publikováno v:
Scientific Reports, Vol 14, Iss 1, Pp 1-19 (2024)
Abstract The Internet of Things (IoT) permeates various sectors, including healthcare, smart cities, and agriculture, alongside critical infrastructure management. However, its susceptibility to malware due to limited processing power and security pr
Externí odkaz:
https://doaj.org/article/99cae7d4c0bd47a1b064fb5d9799fce6
Publikováno v:
International Journal of Electrical and Electronics Research. 10:536-543
Blockchain is the key concept for security purposes for digital applications. But, in some cases, the effectiveness of the malicious behavior has degraded the security function of the blockchain. So, to enrich the blockchain process prediction and to
Publikováno v:
PROCEEDINGS OF THE 1ST INTERNATIONAL CONFERENCE ON FRONTIER OF DIGITAL TECHNOLOGY TOWARDS A SUSTAINABLE SOCIETY.
Publikováno v:
PROCEEDINGS OF THE 1ST INTERNATIONAL CONFERENCE ON FRONTIER OF DIGITAL TECHNOLOGY TOWARDS A SUSTAINABLE SOCIETY.
Publikováno v:
Lecture Notes in Electrical Engineering ISBN: 9789811999888
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::1540446b978e0c0a6872806cecab8731
https://doi.org/10.1007/978-981-19-9989-5_10
https://doi.org/10.1007/978-981-19-9989-5_10
Publikováno v:
PROCEEDINGS OF THE 1ST INTERNATIONAL CONFERENCE ON FRONTIER OF DIGITAL TECHNOLOGY TOWARDS A SUSTAINABLE SOCIETY.
Publikováno v:
Algorithms for Intelligent Systems ISBN: 9789811916687
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::ae073bf77b10123022126808f79a3547
https://doi.org/10.1007/978-981-19-1669-4_4
https://doi.org/10.1007/978-981-19-1669-4_4
Autor:
N Venkatesh, Sk Khaja Shareef, T.S.Raja Rajeswari, Akhtar Ali, V. Sri Monika Devi, Sameer Khan
Publikováno v:
2021 6th International Conference on Communication and Electronics Systems (ICCES).
Every year a lot of students graduate from the universities due to which a huge number of certificates are generated. The problem arises when it comes to authenticate these certificates. At present there is no such mechanism to validate the certifica
Autor:
Sk. Khaja Shareef, V. V. S. S. S. Balaram, Ramu Kuchipudi, Ahmed Abdul Moiz Qyser, N. Thulasi Chitra
Publikováno v:
Advances in Intelligent Systems and Computing ISBN: 9789811315794
Security in wireless sensor networks is very crucial especially whenever they deployed in military applications. Cryptography is used to protect sensitive information from disclosure. Key management is important component in cryptography. Cryptograph
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::2f7820159b6952e62dc588b48d1781c7
https://doi.org/10.1007/978-981-13-1580-0_30
https://doi.org/10.1007/978-981-13-1580-0_30
Publikováno v:
International Journal of Computer Science and Informatics. :209-213
Multiplexing in socket programming is the capability of handling input and output from different I/O channels. we can multiplex UDP and TCP sockets to build multiplexed chat application UDP is a connectionless transport layer protocol. Since TCP does