Secure Communication in Wireless Sensor Networks Using Cuckoo Hash-Based Multi-Factor Authentication
Abstract: As WSNs face factors such as unauthorized access, resource constraints and ever-changing threats, WSNs need enhanced security models. This study presents the Cuckoo Hash-Based Multi-Factor ...
Abstract: The problems of intellectual property (IP) piracy and false IP ownership have emerged as a significant concern for the hardware security community. This paper presents a novel low-cost high ...
Face-Attendance/ │ ├── app.py # Main Flask application ├── utils.py # Face detection and capture functions ├── train_model.py # Model training (KNN) ├── attendance.csv # Attendance records ├── ...
Dublette scans a directory for visually similar media files and removes the duplicates. Unlike byte-level comparison, it uses perceptual hashing to detect files that look the same even if they differ ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results