Now 60 visitors
Today:275 Yesterday:608
Total: 32530 13S 3P 0R
2025-07-07, Week 28
TACT Journal Page
Call for Paper
Author Page
Paper Procedure
Paper Submission
Registration
Welcome Message
Statistics
Committee
Paper Archives
Outstanding Papers
Proceedings
Presentation Assistant
Hotel & Travel Info
Photo Gallery
FAQ
Member Login
Scheduler Login
Seminar
Archives Login
Sponsors




















IEEE/ICACT20220335 Question.1
Questioner: jianms@nfu.edu.tw    2022-02-15 ¿ÀÈÄ 9:27:26
IEEE/ICACT20220335 Answer.1
Answer by Auhor matasemsaleh@gmail.com   2022-02-15 ¿ÀÈÄ 9:27:26
Since the encryption is added, does this research measure the delay or performance? In addition, some researches proposed that the encryption can be based on the MAC address of IoT device. Does this research also consider these algorithm? Thanks a lot for your interest in our research. Yes, the encryption technique elapsed time and performance were included in our research, while the MAC address of the IoT device was not considered.

Select Voice