To search, Click below search items.
All Published Papers Search Service
Title
Security Model for the MCTO Data Transaction Management
Author
Ziyad Tariq Abdul-Mehdi, Byambasuren Byamba and Mohammad M. N. Hamarsheh
Vol. 8 No. 6 pp. 140-149
Keywords
Data network security, Data transmission security, Hybrid cryptography, Authentication, Comparison
Exploration of Color Visual Cryptography By Using Hybrid Technique
Khalid Akbar, Rao Sohail Iqbal, Ghulam Ali, Ume Aymen and Muhammad Yasir
Vol. 17 No. 9 pp. 46-52
Visual cryptography, Hybrid Cryptography scheme, Extended Visual Cryptography Scheme.
Enhancing the Security of Over-The-Air-Activation of LoRaWAN Using a Hybrid Cryptosystem
Kevin Feichtinger, Yuto Nakano, Kazuhide Fukushima, Shinsaku Kiyomoto
Vol. 18 No. 2 pp. 1-9
Internet of Things (IoT), Low Power Wide Area Networks (LPWAN), LoraWAN, Over-The-Air-Activation (OTAA), Hybrid Cryptography