Now 705 visitors
Today:1132 Yesterday:1158
Total: 2787 413S 88P 97R
2026-03-16, Week 12
Member Login
Welcome Message
Statistics & History
Committee
TACT Journal Homepage
Call for Paper
Paper Submission
Find My Paper
Author Homepage
Paper Procedure
FAQ
Registration & Invoice
Paper Archives
Outstanding Papers
Program & Proceedings
Presentation Platform
Hotel & Travel Info
Photo Gallery
Scheduler Login
Seminar
Archives Login
Sponsors
























IEEE/ICACT20220335 Question.1
Questioner: jianms@nfu.edu.tw    2022-02-15 ¿ÀÈÄ 9:27:26
IEEE/ICACT20220335 Answer.1
Answer by Auhor matasemsaleh@gmail.com   2022-02-15 ¿ÀÈÄ 9:27:26
Since the encryption is added, does this research measure the delay or performance? In addition, some researches proposed that the encryption can be based on the MAC address of IoT device. Does this research also consider these algorithm? Thanks a lot for your interest in our research. Yes, the encryption technique elapsed time and performance were included in our research, while the MAC address of the IoT device was not considered.

Select Voice