Search Results - (( java implication drops algorithm ) OR ( leave application modified algorithm ))

  • Showing 1 - 5 results of 5
Refine Results
  1. 1
  2. 2

    Data modification attacks protection using blockchain signing and verification process in bluetooth low energy network / Aiman Nurrasyid Shahrul Kamil by Shahrul Kamil, Aiman Nurrasyid

    Published 2020
    “…The issue of providing end-toend data protection should has been given highest priority by IoT application developer because the data in both private and public networks can be modified and disrupted by attacker. …”
    Get full text
    Get full text
    Thesis
  3. 3
  4. 4
  5. 5