Abstract: The explosion of IoT edge devices has made data security, authenticity, and integrity increasingly difficult to guarantee in settings with limited resources. Low-power Internet of Things ...
Abstract: Secure Hash Algorithm (SHA) is a set of cryptographic hashing algorithms designed to generate fixed-size output hash value from input data of any size. This paper provide an efficient design ...
Tokenization is a crucial technology for ensuring the security and privacy of patient data in clinical research, pharmacovigilance, and drug safety monitoring. As healthcare increasingly integrates ...