Cryptography is a process that converts ordinary text into cipher text and vice-versa. It is not only protecting the data from theft, but can also be used for user authentication. The large number of slices increases the size of devices. In order to reduce the number of slices, lightweight algorithms are used. Achieving high speed and less memory space are the key issues in lightweight devices usi...Show More
Monitoring the physical activities of children is a vital task for parents/caretakers. The use of information and communication technologies (ICT) jointly with artificial intelligence and smart devices can help the parents to monitor their children. Thus the regular physical activities of children can be monitored with high precision and less difficulty. In this paper, a smart vest is designed for...Show More
Mobile ad hoc networks are networks of mobile hosts with wireless interfaces that can dynamically form a network without the aid of any pre-existing infrastructure or centralized administration. Since the network topology changes frequently, efficient adaptive routing protocols such as AODV, DSR, and NTP are used. Security is the one of the major issue in mobile ad hoc network some of the attacks ...Show More