Search Results - adaptive solutions differences encryption algorithm*
Search alternatives:
- solutions differences »
-
1
Enhancing user authentication for cloud web-based application / Detar Beqo
Published 2018“…It uses an enhanced encryption algorithm, and the data is stored securely in the cloud systems. …”
Get full text
Get full text
Get full text
Thesis -
2
A Decentralized Multi-Factor User Authentication Scheme For The Internet Of Things System
Published 2024“…An enhanced PRESENT encryption and an Elliptic-Curve Cryptography algorithm were adapted to achieve a lightweight authentication scheme, a necessity of the resource-constraint devices. …”
Get full text
Get full text
Get full text
Get full text
Thesis
