-
1
Dickson polynomial-based secure group authentication scheme for Internet of Things
Published 2024“…The communication between the IoT devices happens from one trusted entity of an area to the other by way of generating security certificates. Establishing trust by way of generating security certificates for the IoT devices in a smart city application can be of high cost and expensive. …”
-
2
Transforming Towards Secure Global Trade for Customs Administrations Powered by Blockchain
Published 2020“…To build this solution, a proof of concept (PoC) approach is followed using the IBM Hyperledger fabric and Python programming language. The participants of this international trade process are identified. …”
Get full text
-
3
A study on Speaker Recognition System
Published 2015“…Security systems developers and manufacturers are trying hardly to cope with the increasing security breaching attacks. …”
Get full text
-
4
Fire detection and anti-fire system to enhance food security: A concept of smart agriculture systems-based IoT and embedded systems with machine-to-machine protocol
Published 2025“…Food security has become a major concern for most countries. …”
Get full text
Get full text
Get full text
article -
5