Smart verification algorithm for IoT applications using QR tag
Electrical engineering; Mathematical techniques; Brute-force attack; Information leakage; Internet of Things (IOT); QR tag; Security objectives; Smart applications; Unauthorized access; Verification algorithms; Internet of things
Saved in:
Main Authors: | Al-Ghaili A.M., Kasim H., Rahim F.A., Ibrahim Z.-A., Othman M., Hassan Z. |
---|---|
Other Authors: | 26664381500 |
Format: | Conference Paper |
Published: |
Springer Verlag
2023
|
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
Smart verification algorithm for IoT applications using QR tag
by: Al-Ghaili, A.M., et al.
Published: (2020) -
QR Tag based Verification Method for Smart IoT Applications
by: Al-Ghaili, Abbas M., et al.
Published: (2018) -
A new encryption scheme method (ESM) using capsulated-layers conception for verified QR-tag for IoT-based smart access systems
by: Al-Ghaili, A.M., et al.
Published: (2020) -
A new encryption scheme method (ESM) using capsulated-layers conception for verified QR-tag for IoT-based smart access systems
by: Al-Ghaili A.M., et al.
Published: (2023) -
Security factors based evaluation of verification algorithm for an IoT access system
by: Al-Ghaili, A.M., et al.
Published: (2020)