2022
DOI: 10.1016/j.compeleceng.2022.108373
|View full text |Cite
|
Sign up to set email alerts
|

Teletraffic analysis of energy-efficient intruder detection using hash function techniques in images for remote monitoring in Wireless Sensor Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
5
0

Year Published

2024
2024
2024
2024

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(5 citation statements)
references
References 21 publications
0
5
0
Order By: Relevance
“…A hash function is a mathematical algorithm designed to convert input data of any size into a fixed-length output, illustrated in Figure 1 [13]. Widely utilized in various domains, particularly in cryptography [14][15][16], data integrity verification [16][17][18], data indexing [20][21][22], and several other applications [23][24][25][26][27], these functions play a pivotal role in enhancing digital security and efficient information management.…”
Section: Jiang Et Al Developed a Real-time Chaotic Video Encryption S...mentioning
confidence: 99%
“…A hash function is a mathematical algorithm designed to convert input data of any size into a fixed-length output, illustrated in Figure 1 [13]. Widely utilized in various domains, particularly in cryptography [14][15][16], data integrity verification [16][17][18], data indexing [20][21][22], and several other applications [23][24][25][26][27], these functions play a pivotal role in enhancing digital security and efficient information management.…”
Section: Jiang Et Al Developed a Real-time Chaotic Video Encryption S...mentioning
confidence: 99%
“…Hash functions, mathematical algorithms that convert input data of any size into a fixed-length output , illustrated in Figure 1 [13], play a crucial role in cryptography [14][15][16], data integrity verification [16][17][18], data indexing [20][21][22], and other applications [23][24][25][26][27]. Specialized hash functions have been developed to meet the distinct needs of various sectors, with notable contributions from Karthik et al [28], Ayubi et al [29],…”
Section: Introductionmentioning
confidence: 99%
“…A hash function is a mathematical algorithm designed to convert input data of any length into a fixed-size output, as illustrated in Figure 1 [1]. These functions are widely utilized in a variety of domains, notably in cryptography [2][3][4], ensuring data integrity [5][6][7], facilitating data indexing [8][9][10], among other critical applications [11][12][13][14][15]. In response to the diverse needs of these applications, researchers have developed a range of new hash functions, each tailored to meet specific requirements [11], [16][17][18][19][20].…”
Section: Introductionmentioning
confidence: 99%