Search alternatives:
correction algorithm » selection algorithm (Expand Search), compression algorithms (Expand Search), detection algorithms (Expand Search)
correction algorithm » selection algorithm (Expand Search), compression algorithms (Expand Search), detection algorithms (Expand Search)
-
1
-
2
Edge server registration phase.
Published 2025“…The proof of correctness of the proposed protocol has been scrutinized through a well-known and widely used Real-Or-Random (RoR) model, ProVerif validation, and attacks’ discussion, demonstrating the thoroughness of the proposed protocol. …”
-
3
Comparison with existing work.
Published 2025“…In this paper, we incorporate a two-step authentication process, starting with anonymous authentication using a secret ID with Elliptic Curve Cryptography (ECC), followed by an intrusion detection algorithm for users flagged as suspicious activity. …”
-
4
Registration phase.
Published 2025“…In this paper, we incorporate a two-step authentication process, starting with anonymous authentication using a secret ID with Elliptic Curve Cryptography (ECC), followed by an intrusion detection algorithm for users flagged as suspicious activity. …”
-
5
Performance comparison of different ML models.
Published 2025“…In this paper, we incorporate a two-step authentication process, starting with anonymous authentication using a secret ID with Elliptic Curve Cryptography (ECC), followed by an intrusion detection algorithm for users flagged as suspicious activity. …”
-
6
Classification Report for the proposed model.
Published 2025“…In this paper, we incorporate a two-step authentication process, starting with anonymous authentication using a secret ID with Elliptic Curve Cryptography (ECC), followed by an intrusion detection algorithm for users flagged as suspicious activity. …”
-
7
ROC curve of the proposed model.
Published 2025“…In this paper, we incorporate a two-step authentication process, starting with anonymous authentication using a secret ID with Elliptic Curve Cryptography (ECC), followed by an intrusion detection algorithm for users flagged as suspicious activity. …”
-
8
Fog-IoT architecture.
Published 2025“…In this paper, we incorporate a two-step authentication process, starting with anonymous authentication using a secret ID with Elliptic Curve Cryptography (ECC), followed by an intrusion detection algorithm for users flagged as suspicious activity. …”
-
9
Computational cost of the proposed approach.
Published 2025“…In this paper, we incorporate a two-step authentication process, starting with anonymous authentication using a secret ID with Elliptic Curve Cryptography (ECC), followed by an intrusion detection algorithm for users flagged as suspicious activity. …”
-
10
Confusion Matrix of different ML models.
Published 2025“…In this paper, we incorporate a two-step authentication process, starting with anonymous authentication using a secret ID with Elliptic Curve Cryptography (ECC), followed by an intrusion detection algorithm for users flagged as suspicious activity. …”
-
11
Performance metrics of applied ML models.
Published 2025“…In this paper, we incorporate a two-step authentication process, starting with anonymous authentication using a secret ID with Elliptic Curve Cryptography (ECC), followed by an intrusion detection algorithm for users flagged as suspicious activity. …”
-
12
Network model.
Published 2025“…The proof of correctness of the proposed protocol has been scrutinized through a well-known and widely used Real-Or-Random (RoR) model, ProVerif validation, and attacks’ discussion, demonstrating the thoroughness of the proposed protocol. …”
-
13
Comparative Analysis (Performance Metrics).
Published 2025“…The proof of correctness of the proposed protocol has been scrutinized through a well-known and widely used Real-Or-Random (RoR) model, ProVerif validation, and attacks’ discussion, demonstrating the thoroughness of the proposed protocol. …”
-
14
SN/IoT or user registration phase.
Published 2025“…The proof of correctness of the proposed protocol has been scrutinized through a well-known and widely used Real-Or-Random (RoR) model, ProVerif validation, and attacks’ discussion, demonstrating the thoroughness of the proposed protocol. …”
-
15
Communication costs in bits.
Published 2025“…The proof of correctness of the proposed protocol has been scrutinized through a well-known and widely used Real-Or-Random (RoR) model, ProVerif validation, and attacks’ discussion, demonstrating the thoroughness of the proposed protocol. …”
-
16
Communication costs.
Published 2025“…The proof of correctness of the proposed protocol has been scrutinized through a well-known and widely used Real-Or-Random (RoR) model, ProVerif validation, and attacks’ discussion, demonstrating the thoroughness of the proposed protocol. …”
-
17
Mutual authentication phase.
Published 2025“…The proof of correctness of the proposed protocol has been scrutinized through a well-known and widely used Real-Or-Random (RoR) model, ProVerif validation, and attacks’ discussion, demonstrating the thoroughness of the proposed protocol. …”
-
18
Notations used and their descriptions.
Published 2025“…The proof of correctness of the proposed protocol has been scrutinized through a well-known and widely used Real-Or-Random (RoR) model, ProVerif validation, and attacks’ discussion, demonstrating the thoroughness of the proposed protocol. …”
-
19
Comparative Analysis (Security Functionalities).
Published 2025“…The proof of correctness of the proposed protocol has been scrutinized through a well-known and widely used Real-Or-Random (RoR) model, ProVerif validation, and attacks’ discussion, demonstrating the thoroughness of the proposed protocol. …”
-
20
Storage Cost of the Proposed Protocol.
Published 2025“…The proof of correctness of the proposed protocol has been scrutinized through a well-known and widely used Real-Or-Random (RoR) model, ProVerif validation, and attacks’ discussion, demonstrating the thoroughness of the proposed protocol. …”