检索规则说明:AND代表“并且”;OR代表“或者”;NOT代表“不包含”;(注意必须大写,运算符两边需空一格)
检 索 范 例 :范例一: (K=图书馆学 OR K=情报学) AND A=范并思 范例二:J=计算机应用与软件 AND (U=C++ OR U=Basic) NOT M=Visual
作 者:Hamza Mohammed Ridha Al-Khafaji Refed Adnan Jaleel
机构地区:[1]Biomedical Engineering Department,Al-Mustaqbal University College,Hillah,Iraq [2]Information and Communication Engineering Department,Al-Nahrain University,Baghdad,Iraq
出 处:《Journal of Control and Decision》2024年第1期15-25,共11页控制与决策学报(英文)
摘 要:There is a need for increased security measures because of wide variety of android Internet of Thing(IoT)mobile devices that can communicate with each other via networks for controlling the management of enterprise.Elliptic Curve Deffie Hellman(ECDH)and Rivest Shamir Adleman(RSA)are used to secure data in android IoT phones in efficient manner.Android mobile can store a lot of data,including sensitive data.Protecting data saved on mobile has become a critical problem.In android IoT,Collaborative Machine Learning describes a method for collaboratively mining data,which makes it easier to manage and lowers cost of maintenance.To increase security in IoT phones,suggested system uses ECDH,RSA,and CML algorithms,which have been considered novelty of this method.RSA and ECDH are computed using time of decryption,encryption,and key generation.Conclusions show ECDH beats other alternatives like RSA.Finally,all users of the network have been tested.
关 键 词:IOT ECDH RSA CML ANDROID ENCRYPTION DECRYPTION
分 类 号:TP181[自动化与计算机技术—控制理论与控制工程]
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在链接到云南高校图书馆文献保障联盟下载...
云南高校图书馆联盟文献共享服务平台 版权所有©
您的IP:18.220.23.205