Search Results - (( java implication drops algorithm ) OR ( leave application modified algorithm ))
Search alternatives:
- application modified »
- implication drops »
- leave application »
- java implication »
-
1
-
2
Data modification attacks protection using blockchain signing and verification process in bluetooth low energy network / Aiman Nurrasyid Shahrul Kamil
Published 2020“…The issue of providing end-toend data protection should has been given highest priority by IoT application developer because the data in both private and public networks can be modified and disrupted by attacker. …”
Get full text
Get full text
Thesis -
3
-
4
-
5
