Detection and Localization of Multiple Spoofing Attackers Using Asymmetric Key Cryptography Algorithm for Wireless Sensor Network Journal title: International Journal of Innovative Research in Computer Science and Technology Authors: Cherukuri Srikanth, K. Vadivukkarasi Subject(s): Electrical and Electronic Engineering, Chemical Engineering, Civil Engineering, Computer Science, Artificial Intelligence, Computer Science, Information Systems, Computer Science, Interdisciplinary Applications, Engineering, Multidisciplinary, Engineering, Civil, Computer Science, Cybernetics, Computer Science, Theory & Methods, Computer Science, Software Engineering
WORKING ON PROFESSIONAL ACTIVITIES IN THE ACADEMIC LICEUMS OF THE MINISTRY OF INTERNAL AFFAIRS Journal title: International scientific journal Science and Innovation Authors: Ismanova M.N. Subject(s): Archaeology, Arts and Literature, Biological Sciences, Chemistry, Computer and Information Science, Economics, Education, Humanities, Law, Linguistics, Mathematics, Medicine, Philosophy, Physics, Psychology, Social Sciences, Architecture, Agricultural Science
Improving the CSIDH Protocol for Multi-party Cryptography: Rigorous Mathematical Analysis, Efficiency, and Security Comparison Journal title: Engineering and Technology Journal Authors: Mohammed El Baraka, Siham Ezzouak, Subject(s): Engineering, Technology
Enhancing Efficiency and Security in MTC Environments: A Novel Strategy for Dynamic Grouping and Streamlined Management Journal title: Emerging Technologies and Engineering Journal Authors: Maloth Bhavsingh,K Samunnisa,A Mallareddy, Subject(s): Engineering, Artificial Intelligence, Information Technology, Technology