2020 3rd International Conference on Intelligent Sustainable Systems (ICISS) 2020
DOI: 10.1109/iciss49785.2020.9315938
|View full text |Cite
|
Sign up to set email alerts
|

A traceability set up using Digitalization of Data and Accessibility

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
8
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
5
5

Relationship

0
10

Authors

Journals

citations
Cited by 26 publications
(8 citation statements)
references
References 7 publications
0
8
0
Order By: Relevance
“…Furthermore, the suggested data aggregation approach has been proven secure, and it meets all security standards. Finally, the suggested scheme's performance assessment demonstrates its minimal computing expense and transmission delay compared to other relevant systems [24][25][26][27].…”
Section: Related Workmentioning
confidence: 99%
“…Furthermore, the suggested data aggregation approach has been proven secure, and it meets all security standards. Finally, the suggested scheme's performance assessment demonstrates its minimal computing expense and transmission delay compared to other relevant systems [24][25][26][27].…”
Section: Related Workmentioning
confidence: 99%
“…These are usually helpful at eliminating information distortion. In addition, the properties of randomly generated structures like graphs captivate me [28][29][30]. Randomness seems to have a "pattern," If we are not careful, we can leverage this pattern to compromise privacy.…”
Section: System Modelmentioning
confidence: 99%
“…After sharing exchange-keys, A and B generate keys for one another. Because A and B do not have to perform any costly path discovery procedures for routing, this key exchange mechanism can now be used directly in packet forwarding [41][42][43][44].…”
Section: Security Modelmentioning
confidence: 99%