A systematic review on elliptic curve cryptography algorithm for internet of things: Categorization, application areas, and security
Cyberattacks on the Internet of Things (IoT) may be avoided by implementing cybersecurity
protocols on IoT devices, platform packages, and Internet tools. A significant problem is …
protocols on IoT devices, platform packages, and Internet tools. A significant problem is …
[HTML][HTML] Securecipher: An instantaneous synchronization stream encryption system for insider threat data leakage protection
IH Montano, JR Diaz, JJG Aranda… - Expert Systems with …, 2024 - Elsevier
The paper addresses the persistent challenge of insider threat in cybersecurity. Despite
advancements in detection and prevention technologies and approaches, the complexity of …
advancements in detection and prevention technologies and approaches, the complexity of …
A New Lightweight AES for IoT
L Qabajeh, R Tahboub… - 2023 International …, 2023 - ieeexplore.ieee.org
Internet of Things (IoT) introduces new security algorithms requirements and trends since
the algorithms should be lightweight to adapt with IoT devices capabilities. In this paper, we …
the algorithms should be lightweight to adapt with IoT devices capabilities. In this paper, we …
Secure Cloud Computing By A dual-Layer Encryption Mechanism
In today's rapidly expanding era of the Internet of Things (IoT) and the Industrial Internet of
Things (IIoT), the emphasis on robust data security and insightful data interpreta-tion is more …
Things (IIoT), the emphasis on robust data security and insightful data interpreta-tion is more …