|
|
|
Ling Du, Zehong He, Yijing Wang, Xiaochao Wang and Anthony T. S. Ho
Image hashing-based authentication methods have been widely studied with continuous advancements owing to the speed and memory efficiency. However, reference hash generation and threshold setting, which are used for similarity measures between original i...
ver más
|
|
|
|
|
|
Smruti Chourasia,Hrishikesh Bharadwaj Chakrapani,Queenie Das,Krati Agarwal,Lavanya K
The communication boom in the past few decades has resulted in a large flow of data. This entails the need for having high security and privacy with regards to data confidentiality and authenticity. One method of doing so is by utilizing a synchronized k...
ver más
|
|
|
|
|
|
Nubila Nabeel,Mohamed Hadi Habaebi,Nurul Arfah Che Mustapha,Md Rafiqul Islam
Pág. pp. 117 - 129
We are in the era of IoT and 5G technologies. IoT has wide range of applications in Smart Home, Smart cities, Agriculture, Health etc. Due to that, the number of connected sensor devices become increased. Along with that security of these devices become ...
ver más
|
|
|