Search Results - "Sekhar, Krovi Raja"
-
1
Verification of pattern unlock and gait behavioural authentication through a machine learning approach
Published in International journal of intelligent unmanned systems (07-01-2022)“…PurposeThe existing authentication procedures (pin, pattern, password) are not very secure. Therefore, the Gait pattern authentication scheme is introduced to…”
Get full text
Journal Article -
2
-
3
Enhancing security in IIoT applications through efficient quantum key exchange and advanced encryption standard
Published in Soft computing (Berlin, Germany) (01-02-2024)“…The industrial internet of things (IIoT) refers to a system of interconnected equipment, sensors, and devices deployed within industrial environments whose…”
Get full text
Journal Article -
4
Improved fuzzy-based MCDM–TOPSIS model to find and prevent the financial system vulnerability and hazards in real time
Published in Soft computing (Berlin, Germany) (19-05-2023)Get full text
Journal Article -
5
Accountable specific attribute-based encryption scheme for cloud access control
Published in International journal of system assurance engineering and management (09-07-2022)Get full text
Journal Article -
6
Secure federated learning architecture for fuzzy classifier in healthcare environment
Published in Soft computing (Berlin, Germany) (11-07-2023)Get full text
Journal Article