Resource Management in Advanced Wireless Networks 2023
DOI: 10.1002/9781119827603.ch3
|View full text |Cite
|
Sign up to set email alerts
|

Evolution of Next Generation Networks and Its Contribution Towards Industry 5.0

M. Kiruthiga Devi,
M. Padma Priya
Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3

Citation Types

0
3
0

Year Published

2024
2024
2024
2024

Publication Types

Select...
3

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(3 citation statements)
references
References 35 publications
0
3
0
Order By: Relevance
“…In addition, other drive data can be read if the stakeholders restrict it. No such data can be accessed without prior permission [76]- [78].…”
Section: Applications Of Cryptographic Re-encryption For Industrial T...mentioning
confidence: 99%
See 2 more Smart Citations
“…In addition, other drive data can be read if the stakeholders restrict it. No such data can be accessed without prior permission [76]- [78].…”
Section: Applications Of Cryptographic Re-encryption For Industrial T...mentioning
confidence: 99%
“…However, the use of hashing can change the perspective of classical encryption and produce relatively useless symbolic notations for malicious attackers [77]. When a system requires login, a password will be taken from the system if the hash is the same, then compared to the preserved hash value and allowed; otherwise, block it [77], [78], as shown in Figure 4. It is quite a good applicational solution, where at no point does the system fail in terms of attacks from the malicious site or has access to the data without a password.…”
Section: Applications Of Cryptographic Re-encryption For Industrial T...mentioning
confidence: 99%
See 1 more Smart Citation