Performance evaluation of IoT encryption algorithms: memory, timing, and energy
Security in the Internet of Things is a crucial aspect and a lot of studies are focused on
modular and scalable encryption algorithms. Resource constraints at the edge nodes of an …
modular and scalable encryption algorithms. Resource constraints at the edge nodes of an …
Performance Evaluation of IoT Encryption Algorithms: Memory, Timing, and Energy
S Maitra, D Richards, A Abdelgawad… - 2019 IEEE Sensors …, 2019 - dl.acm.org
Security in the Internet of Things is a crucial aspect and a lot of studies are focused on
modular and scalable encryption algorithms. Resource constraints at the edge nodes of an …
modular and scalable encryption algorithms. Resource constraints at the edge nodes of an …