Now 82 visitors
Today:1120 Yesterday:1396
Total: 6127 245S 58P 14R
2025-11-08, Week 45
TACT Journal Page
Call for Paper
Author Homepage
Paper Procedure
Paper Submission
Registration
Welcome Message
Statistics
Committee
Paper Archives
Outstanding Papers
Proceedings
Presentation Assistant
Hotel & Travel Info
Photo Gallery
FAQ
Member Login
Scheduler Login
Seminar
Archives Login
Sponsors




















IEEE/ICACT20220335 Question.1
Questioner: jianms@nfu.edu.tw    2022-02-15 ¿ÀÈÄ 9:27:26
IEEE/ICACT20220335 Answer.1
Answer by Auhor matasemsaleh@gmail.com   2022-02-15 ¿ÀÈÄ 9:27:26
Since the encryption is added, does this research measure the delay or performance? In addition, some researches proposed that the encryption can be based on the MAC address of IoT device. Does this research also consider these algorithm? Thanks a lot for your interest in our research. Yes, the encryption technique elapsed time and performance were included in our research, while the MAC address of the IoT device was not considered.

Select Voice