Abstract: Hardware intellectual property (IP) cores are an integral component of consumer electronic (CE) systems. However, due to globalization in the design supply chain, influx of pirated/fake IPs ...
Secure Communication in Wireless Sensor Networks Using Cuckoo Hash-Based Multi-Factor Authentication
Abstract: As WSNs face factors such as unauthorized access, resource constraints and ever-changing threats, WSNs need enhanced security models. This study presents the Cuckoo Hash-Based Multi-Factor ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results