Now 233 visitors
Today:634 Yesterday:1504
Total: 862 401S 106P 78R
2025-12-25, Week 52
Member Login
Welcome Message
Statistics
Committee
TACT Journal Homepage
Call for Paper
Paper Submission
Find My Paper
Author Homepage
Paper Procedure
FAQ
Registration / Invoice
Paper Archives
Outstanding Papers
Proceedings
Presentation Assistant
Hotel & Travel Info
Photo Gallery
Scheduler Login
Seminar
Archives Login
Sponsors
























IEEE/ICACT20220335 Question.1
Questioner: jianms@nfu.edu.tw    2022-02-15 ¿ÀÈÄ 9:27:26
IEEE/ICACT20220335 Answer.1
Answer by Auhor matasemsaleh@gmail.com   2022-02-15 ¿ÀÈÄ 9:27:26
Since the encryption is added, does this research measure the delay or performance? In addition, some researches proposed that the encryption can be based on the MAC address of IoT device. Does this research also consider these algorithm? Thanks a lot for your interest in our research. Yes, the encryption technique elapsed time and performance were included in our research, while the MAC address of the IoT device was not considered.

Select Voice