Found: 6
Select item for more details and to access through your institution.
A Concentrated Energy Consumption Wireless Sensor Network by Symmetric Encryption and Attribute Based Encryption Technique.
- Published in:
- Journal of Cybersecurity & Information Management, 2023, v. 12, n. 1, p. 8, doi. 10.54216/JCIM.120101
- By:
- Publication type:
- Article
An Upgraded Data Security Based on Homomorphic Encryption and Aggregate Signature Method in Wireless Sensor Network.
- Published in:
- Journal of Cybersecurity & Information Management, 2023, v. 12, n. 1, p. 19, doi. 10.54216/JCIM.120102
- By:
- Publication type:
- Article
An Improved Analysis of Secured Permutation and Substitution based Image Encryption.
- Published in:
- Journal of Cybersecurity & Information Management, 2023, v. 12, n. 1, p. 30, doi. 10.54216/JCIM.120103
- By:
- Publication type:
- Article
Cybersecurity Detection Model using Machine Learning Techniques.
- Published in:
- Journal of Cybersecurity & Information Management, 2023, v. 12, n. 1, p. 41, doi. 10.54216/JCIM.120104
- By:
- Publication type:
- Article
Blockchain Meets Edge Intelligence for Smart Cities Sustainability: An Insightful Review and Prospective Analysis.
- Published in:
- Journal of Cybersecurity & Information Management, 2023, v. 12, n. 1, p. 50, doi. 10.54216/JCIM.120105
- By:
- Publication type:
- Article
On a Generalization of RSA Crypto-system By Using 2-Cyclic Refined Integers.
- Published in:
- Journal of Cybersecurity & Information Management, 2023, v. 12, n. 1, p. 67, doi. 10.54216/JCIM.120106
- By:
- Publication type:
- Article