Pic18f bootloader data encryption jobs

Filter

My recent searches
Filter by:
Budget
to
to
to
Type
Skills
Languages
    Job State
    2,000 pic18f bootloader data encryption jobs found, pricing in USD

    Need a experieced node Backend developer who worked with encryption and decryption techniqe and able to write REST API using node. This link contains One file of hybrid encription technique which you have to used during request and response, ssl files for testing from both the client and bank server. The API Integration doc contains List of 10 API So your task is to write all the 10 REST API in different files on our server and run, which request the testing URL mentaioned on doc and get the appropriate resonce according to doc. Please check this link first and then ping

    $95 (Avg Bid)
    $95 Avg Bid
    14 bids

    Need a experieced PHP Backend developer who worked with encryption and decryption techniqe and able to write REST API using Curl. This link contains One file of hybrid encription technique which you have to used during request and response, ssl files for testing from both the client and bank server. The API Integration doc contains List of 10 API So your task is to write all the 10 REST API in different files on our server and run, which request the testing URL mentaioned on doc and get the appropriate resonce according to doc. Please check this link first and then ping

    $112 (Avg Bid)
    $112 Avg Bid
    14 bids

    ...and I'll deliver a proof-of-concept with a demo and documentation. It will showcase the working solution without me touching your production (sensitive) data. Also, you may decide to do it yourself on the production server which gives you more control. ### Management ### + Fixed-time: 20 working days (4 business weeks, weekly delivery/demo) + Fixed-price: $2000 (4 milestones, $500 each) ### Work Breakdown ### + proof-of-concept with demo and documentation for the following: + Milestone #1: Always Encrypted + Milestone #2: Dynamic Data Masking + Milestone #3: Transparent data encryption (TDE) + Milestone #4: Application-level encryption ### Out of Scope ### + SQL Server health check + Actual implementation ### Deliverable(s) ### + Docum...

    $2000 (Avg Bid)
    $2000 Avg Bid
    1 bids

    As the title , you should know how to build a project using Node, Express, Typescript, Jasmine & Postgres and JWT Authentication from scratch and do not copy from the internet or i will not accept it. Build a JavaScript API based on a requirements. You will architect the database, tabl...should know how to build a project using Node, Express, Typescript, Jasmine & Postgres and JWT Authentication from scratch and do not copy from the internet or i will not accept it. Build a JavaScript API based on a requirements. You will architect the database, tables, and columns to fulfill the requirements. Create a RESTful API. You will also have written test, secured user information with encryption, and provide tokens for integration into the frontend. all the requirement in deta...

    $30 (Avg Bid)
    $30 Avg Bid
    9 bids

    Hi there, I need someone to hire on a monthly basis just to keep an e...you are aware of UNIFI devices and can do the following then get in touch. Setting up individual logins for WIFI access Guest wifi Change guest WIFI access IP address Agreeing thresholds for GUEST / USER access - data limits We need to be able to identify & blacklist domains – via a recommended centralised/public repository – on a regular basis automatically. What tools are in place to do this? Data Leak protection – what thresholds can we set up in the router to monitor and block high data frequency anomalies (ie bursts of exceptional data volume) Please confirm TLS encryption level and what options we have to ‘increase’ / change, we need a min of...

    $182 (Avg Bid)
    $182 Avg Bid
    8 bids

    Need a experieced PHP Backend developer who worked with encryption and decryption techniqe and able to write REST API using Curl. This link contains One file of hybrid encription technique which you have to used during request and response, ssl files for testing from both the client and bank server. The API Integration doc contains List of 10 API So your task is to write all the 10 REST API in different files on our server and run, which request the testing URL mentaioned on doc and get the appropriate resonce according to doc. Please check this link first and then ping

    $125 (Avg Bid)
    $125 Avg Bid
    7 bids

    ...Blockchain with the requiremend that it is possible to mine with small CPU devices (also with raspberry) and also that the miners can build there own nodes and masternodes easy with a github respority. The mining software we need for lunix and windows. the usecases for the blockchain will be: decentralized messenger cryptocurrencies own DEX metaverse importend is a fast transactionspeed ED25519 encryption if possible it have to be also possible to generate new tokens and new usescases with smartcontracts we also need Bridges to other blockchains the chain have a own coin and 1 utilitytoken for the beginning. So the first part what we need now is: develop the chain develop the mining in the chain develop a miningpool and the miningsoftware for linux and windows make the miningp...

    $48064 (Avg Bid)
    $48064 Avg Bid
    34 bids

    Need a experieced PHP Backend developer who worked with encryption and decryption techniqe and able to write REST API using Curl. This link contains One file of hybrid encription technique which you have to used during request and response, ssl files for testing from both the client and bank server. The API Integration doc contains List of 10 API So your task is to write all the 10 REST API in different files on our server and run, which request the testing URL mentaioned on doc and get the appropriate resonce according to doc. Please check this link first and then ping

    $99 (Avg Bid)
    $99 Avg Bid
    9 bids

    Need a experieced PHP Backend developer who worked with encryption and decryption techniqe and able to write REST API using Curl. This link contains One file of hybrid encription technique which you have to used during request and response, ssl files for testing from both the client and bank server. The API Integration doc contains List of 10 API So your task is to write all the 10 REST API in different files on our server and run, which request the testing URL mentaioned on doc and get the appropriate resonce according to doc. Please check this link first and then ping

    $86 (Avg Bid)
    $86 Avg Bid
    11 bids

    Create a smart contract in solidity with the following functionality. Any wallet can send an encrypted message to another wallet. The sendMessage function takes the recipient address and the message as input parameters. The message is then encrypted with wallet-to-wallet (peer-to-peer) encryption and put it on the blockchain. The receiveMessages function returns the array of all decrypted messages where the is the recipient. The goal is to read the actual messages sent by the sender and only the recipient should be able to do that. It is important that the messages can only be encrypted with the public address and decrypted by the owner of the recipient wallet WITHOUT providing the private key. Use signature or anything of that sort to solve it. Import external open-source libr...

    $100 - $100
    $100 - $100
    0 bids

    Hey, I would like to create authentication based on nest & sequalize mysql Database structure: username and password (no encryption needed) Requests should be like this: /login with (username and password) if login succeseed it should insert to db jwt token with userid and pass cookie to frontend. /profile if cookie is passed and already exists on database it will show normal api, if no he will get Unauthorized error.

    $10 - $30
    $10 - $30
    0 bids

    ...that: Users of the site have three levels (Entire site management) - (Admin/hostel) - (Administrator/guest clients) - Each hostel shall have a special code that it gives to its customers to enter, and it is subject to change - Each customer has a number of points in his balance, and the lowest number of points has priority in the hostel to increase the number of visits Customer data can be added from an excel file - Each customer has a maximum number of visits to the residence. In the event that the customer reaches the maximum number of visits, he will be excluded from the list temporarily. If all customers reach the maximum limit, the setup will be repeated to start over. - There are special pre-settings for each customer that determine the times he needs...

    $969 (Avg Bid)
    $969 Avg Bid
    57 bids

    I need help with reading analogue signal using Sparkplug / Micronucleus bootloader

    $26 (Avg Bid)
    $26 Avg Bid
    11 bids

    we have small PHP project built in YII.2.0 framework which encrypt some form input and save in encrypted form in database. For display in form it again decrypt data at time on website load. we need some one to check what encryption this project has used and built one php page to manually decrypt or encrypt any data using existing encrypt n decrypt function.

    $75 (Avg Bid)
    $75 Avg Bid
    6 bids

    1. This project using 1 activity, mainActivity, using Kotlin 2. Add OpenSSL library to Android Studio, you can use this pre-build ht...this pre-build or , if you prefer other source it's ok 3. Make Android Studio able to use cpp script and OpenSSL library 4. Make in cpp to GeneratePrivKey (I'll give the source code) 5. after generate privekey and public key, asymmetric encryption and decryption in c++ (I'll give script too) 6. call number 4 and 5 in mainActivity and show Original text(input in edittext), encryption and decryption in textView The MAIN GOAL is to include OpenSSL I will confirm your work before make milestone, send apk that work to confirm source code in complete Android Studio Project

    $24 (Avg Bid)
    $24 Avg Bid
    6 bids

    1. This project using 1 activity, mainActivity, using Kotlin 2. Add OpenSSL library to Android Studio, you can use this pre-build to Android Studio, you can use this pre-build , if you prefer other source it's ok 3. Make Android Studio able to use cpp script and OpenSSL library 4. Make in cpp to GeneratePrivKey (I'll give the source code) 5. after generate privekey and public key, asymmetric encryption and decryption in c++ (I'll give script too) 6. call number 4 and 5 in mainActivity and show Original text(input in edittext), encryption and decryption in textView The MAIN GOAL is to include OpenSSL I will confirm your work before make milestone, send apk that work to confirm

    $50 (Avg Bid)
    $50 Avg Bid
    8 bids

    Hi I need to have a working rustdesk setup on my vm protected by password protection, so that it's usable only with the password and with enabled end2end encryption. I also need the steps to reproduce the setup (the commands on the cli/gui) as I may change the vm. Max 100 euros.

    $125 (Avg Bid)
    $125 Avg Bid
    7 bids

    We are in need of a highly skilled web developer to create a website for our service. The website should be designed to be user-friendly and easy to navigate, with a clean and modern layout. It should have secure user login and encryption of user data to ensure that personal information is protected. The website should also have detailed reporting and analytics tools for administrators to track and manage. It should be mobile responsive and optimized for different devices. It is also essential that all necessary legal and compliance are met and displayed on the website, including privacy policy and terms of use. Lastly, the website should include a clear and easy-to-find section for support and contact information, including phone, email, and chat support options to assist ...

    $980 (Avg Bid)
    $980 Avg Bid
    43 bids

    Looking for a lead engineer can has existing knowledge on digital certificates (PKI encryption), backend development, proven devops experience, demonstrable ability to lead products end to end, supporting products long term and knack of reading documentations regarding dev requirements and supporting external third party audits for certifications. This will be a long term role/project with full time offers behind it after showing proper skills. You should be knowledgeable of Node/Mongo/Python and any other languages which are needed for the project

    $21 / hr (Avg Bid)
    $21 / hr Avg Bid
    54 bids

    I need someone expert with data privacy and previous knowledge of blockchain and encryption to design a solution for me. we would be working in long term if things go well.

    $381 (Avg Bid)
    $381 Avg Bid
    10 bids

    ...operational environment; sustain capacity and performance requirements, consolidate and tune databases for optimal efficiency, maintain systems and platforms at 99% availability (outside of scheduled downtime), and ensure data integrity through performance of daily, weekly, and monthly checklists for monitoring of logs, space checks, audit reports and backups. ● Maintain and update the database architecture, including upgrading and installing databases. ● Provide recommendations on planned hardware OS and configuration upgrades /modifications on database servers to protect and verify data and database services are working. ● Monitor systems and platforms for availability; oversee backup, clustering, mirroring, replication, fail-over, and the restoration and recovery using ...

    $583 (Avg Bid)
    $583 Avg Bid
    15 bids

    I have firmware for 7 segments display written in C, for Arduino. It displays data from the serial RS-485 or the DAC 4-20mA interface, into the 4 digits. In addition to adapting the Arduino firmware to the PIC18F, two P10 displays will be used to replace the 4-digit, 7-segment display. P10 display libraries available on the internet (validated). The hardware: > Mickroe Clicker 2 for PIC18FK > RS485 Isolator 2 Click > 4-20mA R click > 2un P10 display

    $1117 (Avg Bid)
    $1117 Avg Bid
    21 bids

    Hi Gowtham R., I noticed your profile and would like to offer you my project. We can discuss any details over chat. Want a program (or a way of encryption) to protect a Dynamo file (.dyn) to give access only to Dynamo Player and prevent any user to open it or modify it. with 125$ fixed price 8:1

    $125 (Avg Bid)
    $125 Avg Bid
    1 bids

    Hi Carlos M., I noticed your profile and would like to offer you my project. We can discuss any details over chat. Want a program (or a way of encryption) to protect a Dynamo file (.dyn) to give access only to Dynamo Player and prevent any user to open it or modify it. with 125 $ fixed price

    $150 (Avg Bid)
    $150 Avg Bid
    1 bids

    Need a experieced PHP Backend developer who worked with encryption and decryption techniqe and able to write REST API using Curl. This link contains One file of hybrid encription technique which you have to used during request and response, ssl files for testing from both the client and bank server. The API Integration doc contains List of 10 API So your task is to write all the 10 REST API in different files on our server and run, which request the testing URL mentaioned on doc and get the appropriate resonce according to doc. Please check this link first and then ping

    $104 (Avg Bid)
    $104 Avg Bid
    4 bids

    Looking for Next Js expert who can help me build a POC project where we need to call one API with some transaction data, in response we will get one onetime url which opens a PIN page with data sent in api. From the PIN page we capture PIN and send it to server in encrypted format. Encryption and security here is most important element, even if if inspect webpage i should not get access of api request and PIN captured. PIN page will have custom numeric keypad something like what we see in UPI apps in India. This is POC project and bigger project will come once we get security go ahead for the implementation then main project will come.

    $323 (Avg Bid)
    $323 Avg Bid
    15 bids

    Hello Please go through the project details carefully before putting in a bid. I would like to have a saas solution to manage different kinds of licenses inside all scale companies. which should have the following features App Server - Language: Javascript, or php, or go Database Server - MySQL Authentication : - Must use encryption Payments gateway : - Stripe Emails (Transactional) - confirm registration email, - user welcome, - Alert for End of subscription Main page: - Attracting GUI: must match the theme of the license management solution - Request a demo Option - Three types of subscriptions - Section to define the benefits of using our solution (content to be updated after by itecs team) - See how it works content place + video (initial video to use the softwar...

    $662 (Avg Bid)
    NDA
    $662 Avg Bid
    12 bids

    Convert Javascript Encryption Method to C#

    $266 (Avg Bid)
    $266 Avg Bid
    37 bids

    ...libraries to generate all keys and calculate all RSA/Diffie-Hellman values in this step. Once both sides calculate PS, they use it along with the first two nonces as a seed to a pseudorandom number generator to generate the 4 communication keys. You are free to implement this step in any way using libraries. Let’s call the 4 keys {CC, IC, CS, IS}, representing the encryption key of the client, CC, the MAC key of the client, IC, the encryption key of the server CS, and the MAC key of the server, IS. The client the sends the server hash(nonce_client, nonce_server, premaster secret, CC, IC). The server sends to the client hash(nonce_client, nonce_server, premaster secret, CS, IS). Each side will verify the values they received and print either a success or failure messa...

    $10 / hr (Avg Bid)
    $10 / hr Avg Bid
    16 bids

    ...without downtime & released periodically Licensing Model: Open to your recommendations (Perpetual based on module) Users Log (audit): Historic User Logs cannot be edited/amended/deleted/erased to know what was done with and in the applications (Such as creating many users and deleting it) Logs: Can be send to multiple systems (such as SIEM and other security tools) Security: SSO, Custom SAML, 2FA, Encryption, Penetration Testing Dashboards: Visualize tasks, processes, analytics, and more. Task Management: Documents, Spreadsheet, Folders, Projects, Tasks, Subtasks create an unlimited number of items — folders, projects, tasks, and subtasks — for your team and easily view which assignee is responsible for each specific initiative. Collaborate: Work cross-funct...

    $97 (Avg Bid)
    $97 Avg Bid
    10 bids

    ...email or Google Authenticator for secure access 256-bit AES SSL protection for data encryption File sharing and transfer capabilities Built-in chat window for communication with the remote user Buttons for common keyboard shortcuts (e.g., switch users, open Run box, open File Explorer) System information viewer to display live and historic data on hard disk usage, CPU usage, top 10 processes, data traffic, uptime, and memory usage Optional email notifications when disk space falls below a certain threshold or load exceeds a certain level Full-screen mode for an immersive remote desktop experience Audio calling and microphone support for remote meetings Clipboard sharing to transfer text, images, and other data between the local and remote devi...

    $604 (Avg Bid)
    $604 Avg Bid
    31 bids

    1. The Term Project concerns developing Secure Student Attendance Tracking System (SSATS) having actors: Student, Teacher, Chair, Parent, and System Administrator. Student can view only his/her record. Teache...(SSATS) having actors: Student, Teacher, Chair, Parent, and System Administrator. Student can view only his/her record. Teacher can enter/modify attendance of students in his/her groups. Chair can view only all Departmental students’ records. Parent can view only records of his/her children-students. System Administrator can create only course-group attendance tables. Data tables are kept on the disk DES-encrypted. Keys for encryption/decryption are created/periodically updated by System Administrator. System Administrator also introduces new user and grants/revo...

    $52 (Avg Bid)
    $52 Avg Bid
    11 bids

    1. The Term Project concerns developing Secure Student Attendance Tracking System (SSATS) having actors: Student, Teacher, Chair, Parent, and System Administrator. Student can view only his/her record. Teach...(SSATS) having actors: Student, Teacher, Chair, Parent, and System Administrator. Student can view only his/her record. Teacher can enter/modify attendance of students in his/her groups. Chair can view only all Departmental students’ records. Parent can view only records of his/her children-students. System Administrator can create only course-group attendance tables. Data tables are kept on the disk DES-encrypted. Keys for encryption/decryption are created/periodically updated by System Administrator. System Administrator also introduces new user and grants/revok...

    $351 (Avg Bid)
    $351 Avg Bid
    45 bids

    Hi, i need a newly configured server with the latest versions of the apps above. The server should be fast without a GUI. mysql needs to be deaktivated if its currently installed there (what i think it is). postgres access should be restricted to the local maschine and accessible with bash or pgadmin4. Finaly there should run my application with ssl encryption on the tomcat server. the ssl certificate should be auto renewed and a domain configured for the access. It would be great if we can do this job fast so that hopefully i get the new server running within 48 hours from starting the project. i want start the project shortly to finish it this year. I can create milestones if you want. Bests - Thomas I need an invoice before i can pay the final milestone.

    $173 (Avg Bid)
    $173 Avg Bid
    43 bids

    Hi attached you will find the settings for the device, it is not a mobile phone, its an android for scanning and programming nfc tags only. no mobile carrier service required, but the rest of the services must work after unlocked wifi, bluetooth, nfc tag programming, upc laser scanner. would like the newest OS that can be installed f...like the newest OS that can be installed from android or and if custom rom is able to be installed. I have a pc and usb connection to device and its ready now. You must have had experience with ZEBRA TC70x devices since they are very difficult and specific methods for these devices. Please don't assume you know and test on this device and brick it. if you have ZEBRA Symbol experience unlocking bootloader only. see all info attached and message me...

    $19 (Avg Bid)
    $19 Avg Bid
    6 bids

    I need an expert for video encrypt & decrypt. I will have many projects about videos.

    $118 (Avg Bid)
    $118 Avg Bid
    49 bids

    In this project students are asked to implement a an XTEA Encryption/Decryption VHDL Engine, implemented in both C code and VHDL code. It supposed to be built as a custom hardware module and be interfaced to the NIOS II soft processor in the Alter- Intel Cyclone V FPGA chip [De-10Nano board]. The HDL code implements 2 number of pins: first an input from stdr_logic_vector type form of 32-bit length, and second an output with 32-bit of the same type. The Key is 32-bit in length, and they must be stored inside the VHDL code. The input reception and output generation may take multiple clock cycles or states but could be designed in less than that if was applicable. The internet could be surfed to lookup codes for both C and VHDL but the group is responsible to convert and modify the cod...

    $492 (Avg Bid)
    $492 Avg Bid
    16 bids

    i have javascript code i want to obfusticate it with encryption key and it should still work and then I can decrypt it by the key

    $31 (Avg Bid)
    $31 Avg Bid
    28 bids

    1. The Term Project concerns developing Secure Student Attendance Tracking System (SSATS) having actors: Student, Teacher, Chair, Parent, and System Administrator. Student can view only his/her record. Teach...(SSATS) having actors: Student, Teacher, Chair, Parent, and System Administrator. Student can view only his/her record. Teacher can enter/modify attendance of students in his/her groups. Chair can view only all Departmental students’ records. Parent can view only records of his/her children-students. System Administrator can create only course-group attendance tables. Data tables are kept on the disk DES-encrypted. Keys for encryption/decryption are created/periodically updated by System Administrator. System Administrator also introduces new user and grants/revok...

    $64 (Avg Bid)
    $64 Avg Bid
    18 bids

    First off, I'm not sure if my project request is possible. PLEASE review the following details before you place a bid. I have a small javascript project that works. The issue is that a portion of the script appears (to me) to have been encrypted. What I am seeking is for the script to work, without ANY encryption. I have attached the entire zipped project (3 files). Please note that the "encrypted" part, if that is what it is, begins on line 48 of the "" file. I will be available to respond to any questions. Thank you.

    $20 (Avg Bid)
    $20 Avg Bid
    6 bids

    PLEASE APPLY IF YOU HAD PRIOR EXPERIENCE ON THIS. I am looking for someone to provide me a windows command to encrypt and decrypt a windows file using Gpg4win . should use a password to encrypt/decrypt the file.

    $115 (Avg Bid)
    $115 Avg Bid
    7 bids

    We have our application services developed and deployed across d...implementation and do some security audits 5+ years of experience in implementing API authentication using Oauth2.0 for various grant types 5+ years of experience in architecting and building microservices using Laravel Hands-on experience with CI/CD process across multiple servers Strong understanding and experience with auth technologies such as SAML, Oauth2.0 & OpenID Experience with End to End encryption, Multifactor Authentication (MFA), Single Sign-on (SSO) and Mobile Device Management (MDM) will be considered as a great plus Experience in cloud technology - Azure/AWS/GCP with docker, kubernetes will be considered as a great plus Experience in designing and performing security audits will be considered a...

    $105 (Avg Bid)
    $105 Avg Bid
    6 bids

    Job is to create a project in C++ Builder, add the needed files from Crypto++ stack to make a Salsa and AES-ECB encryption/decryption. Thus a function which can encrypt a text string in Salsa + EAS-ECB, and a function which can decrypt the encrypted text string. You should only bid if you have good experience with C++ Builder. The files can be downloaded at

    $139 (Avg Bid)
    $139 Avg Bid
    16 bids

    I have a website that use wordpress, actually the client upload a file in json or excel via an ftp and with a script it import the information to a database under PHP myadmin in WordPress or with a cron we have a export every 5 mins json or excel depend on the script we are using. But we are looking to secure the procedure where the client upload the file as a pgp then we use a script to extract it to json or excel so that our script can import it to the database and same for export, our script export the file in a folder then we concert it in pgp. We use Cpanel environement Please note that we have two type of script it either json or excel.

    $515 (Avg Bid)
    $515 Avg Bid
    35 bids

    When I log in automatically using C # http, I encounter http header authentication. The authentication comes from an encrypted string calculated by the js method on the page. This js method is static, but I can't find which js method is encrypting. I need someone to help me write the encrypted js method into a c # method or a na...When I call this method, I find another way to get the parameter values, input them into the method, and get the final same encrypted string. I am engaged in computer crawler work. I have a lot of work to be outsourced, and the payment fund is stable and reliable. I need to be able to find background developers who use C #+CEFSHARP technology, and senior front-end developers to help me crack encryption parameters, WEBSOCKET and other web communication...

    $532 (Avg Bid)
    $532 Avg Bid
    14 bids

    encryption software to share files with limited license (1..2....) years ... the file is opened by Autodesk program , also I want to secure it when opened by the Autodesk program the file:- Dynamo Script ( .dyn)

    $204 (Avg Bid)
    $204 Avg Bid
    5 bids

    encryption software to share files with limited license (1..2....) years ... the file is opened by Autodesk program , also I want to secure it when opened by Autodesk program the file :- Dynamo Script ( .dyn)

    $200 (Avg Bid)
    $200 Avg Bid
    6 bids

    ...register address offset #define QUOT_REG_OFT 3 #define REMN_REG_OFT 4 #define REDY_REG_OFT 5 #define DONE_REG_OFT 6 /* main program */ int main () { alt_u32 a, b, q, r, ready, done; printf("Division accelerator test #2: nn"); while (1){ printf "Perform division a / b = q remainder rn"); printf("Enter a: " ); scanf ('"/.d", fea); printf("Enter b: " ); scanf("%d", &b); /* send data to division accelerator */ I0WR(DIV32_BASE, DVND_REG_OFT, a ); I0WR(DIV32_BASE, DVSR_REG_OFT, b ); /* wait until the division accelerator is ready */ while(1) { ready = IORD(DIV32_BASE, REDY_REG_OFT) & 0x00000001; if (ready == l) break; } /* generate a 1—pulse */ printf(...

    $620 (Avg Bid)
    $620 Avg Bid
    12 bids

    I want to get real-time stock chart data. But they communicate with encrypted data. I'm looking for someone to unlock the encryption by analyzing the data from the site. JS should be different and have a good understanding of communication.

    $131 (Avg Bid)
    $131 Avg Bid
    15 bids

    From Raspberry Pi 4 model b with sensors like temp, spo2, heartrate collecting data from it and encrypting in the edge level Using Homomorphic Encryption and decryption with the same algorithm while retriveing data from cloud

    $114 (Avg Bid)
    $114 Avg Bid
    6 bids