Security comes first, a public-key cryptography framework for the internet of things
H Shafagh, A Hithnawi - … Computing in Sensor Systems, 2014 - ieeexplore.ieee.org
… secure E2E communication with constrained environments involving Public-key Cryptography
… , compact certificates and hardware acceleration engines for crypto. Moreover, we aim at …
… , compact certificates and hardware acceleration engines for crypto. Moreover, we aim at …
[HTML][HTML] An analysis of cybersecurity attacks against internet of things and security solutions
MR Islam, KM Aktheruzzaman - Journal of Computer and …, 2020 - scirp.org
… these security challenges, we need to come with security solutions that use low overhead
protocols and inexpensive computational algorithms and can provide strong encryption and …
protocols and inexpensive computational algorithms and can provide strong encryption and …
[HTML][HTML] Security trends in Internet of Things: A survey
… The primary purpose of this research work is to explore the latest security solutions in the IoT…
security solutions are addressed by using existing encryption techniques and novel security …
security solutions are addressed by using existing encryption techniques and novel security …
Hybrid optimization with cryptography encryption for medical image security in Internet of Things
M Elhoseny, K Shankar, SK Lakshmanaprabu… - Neural computing and …, 2020 - Springer
… security systems are also using encryption or steganography, or their mixes. There is distinctive
securable and perfect course of action of image encryption … require anchored answers for …
securable and perfect course of action of image encryption … require anchored answers for …
A review of security in internet of things
… In addition, we describe various recent security solutions and classify them based on their …
cryptographic algorithms. The work in [55] described some cloud-based solutions that secure …
cryptographic algorithms. The work in [55] described some cloud-based solutions that secure …
[图书][B] Wireless Communications Security: Solutions for the Internet of Things
JTJ Penttinen - 2016 - books.google.com
… solutions and challenges of wireless security by summarizing typical, currently utilized services
and solutions… of the chip during a cryptographic operation which may give hints about the …
and solutions… of the chip during a cryptographic operation which may give hints about the …
Security Challenges in the IP-based Internet of Things
… These security services can be implemented by means of different cryptographic … as
general-purpose key exchange and security solutions exist for the Internet domain, we focus on the …
general-purpose key exchange and security solutions exist for the Internet domain, we focus on the …
Challenges of securing Internet of Things devices: A survey
MG Samaila, M Neto, DAB Fernandes… - Security and …, 2018 - Wiley Online Library
… for solutions based on cryptographic primitives; solutions based on … proposals on security
middlewares and secure solutions for … The authors observed that IoT services can only gain the …
middlewares and secure solutions for … The authors observed that IoT services can only gain the …
Cryptographic system for data applications, in the context of internet of things
P Panagiotou, N Sklavos, E Darra… - Microprocessors and …, 2020 - Elsevier
… cryptographic system, specialized for data applications of IoT. It integrates alternative
cryptographic and security services… is to influence on the privacy systems, that are beneficial to …
cryptographic and security services… is to influence on the privacy systems, that are beneficial to …
Securing the Internet of Things in a quantum world
… future security solutions for the IoT. … security of the cryptographic schemes used today, and
then give an overview of the recommendations for cryptographic schemes that can be secure …
then give an overview of the recommendations for cryptographic schemes that can be secure …