Secure Communication in Wireless Sensor Networks Using Cuckoo Hash-Based Multi-Factor Authentication
Abstract: As WSNs face factors such as unauthorized access, resource constraints and ever-changing threats, WSNs need enhanced security models. This study presents the Cuckoo Hash-Based Multi-Factor ...
Abstract: Recent years have seen extensive adoption of blockchain technology across a variety of application domains, all with the goal of enhancing data privacy, system trustworthiness, and security.
This package allows laying out the term list as a regular table. By default, the terms form the first column and the descriptions are in the second column, but it can also be transposed. As an ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results