Security factors based evaluation of verification algorithm for an IoT access system
Soft computing; Internet of Things (IOT); QR tag; Security Architecture; Security factors; Security objectives; Smart access; Smart city applications; Verification algorithms; Internet of things
Saved in:
Main Authors: | Al-Ghaili A.M., Kasim H., Othman M., Hassan Z. |
---|---|
Other Authors: | 26664381500 |
Format: | Conference Paper |
Published: |
Springer Verlag
2023
|
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
Security factors based evaluation of verification algorithm for an IoT access system
by: Al-Ghaili, A.M., et al.
Published: (2020) -
Smart verification algorithm for IoT applications using QR tag
by: Al-Ghaili, A.M., et al.
Published: (2020) -
Smart verification algorithm for IoT applications using QR tag
by: Al-Ghaili A.M., et al.
Published: (2023) -
Efficient Implementation of 2D Barcode Verification Algorithm for IoT Applications
by: Al-Ghaili, A.M., et al.
Published: (2020) -
Efficient Implementation of 2D Barcode Verification Algorithm for IoT Applications
by: Al-Ghaili A.M., et al.
Published: (2023)