A roadmap to smart homes security aided SDN and ML

T Altaf, R Braun - 2022 5th Conference on Cloud and Internet of …, 2022 - ieeexplore.ieee.org
The smart home is one of those significant technology trends which enhances comfort and
allows the integration of environment-friendly smart applications in daily life. It contains a …

物联网技术在海带育苗过程中的应用研究进展

王海默, 于航, 朱绍彰, 张启宇, 刘峰, 王承国 - 农学学报, 2022 - nxxb.caass.org.cn
海带(Laminaria japonica) 是一种多年生大型食用藻类, 育苗是海带养殖的基础环节.
物联网技术与海带育苗生产融合是海带养殖育苗产业转型升级的必然选择 …

A Zero Trust Approach to Fundamentally Redesign Network Architecture within Federal Agencies

C Moore - 2022 - search.proquest.com
Many federal agencies are in a hybrid state between the virtualized, server-centric
computing phase of the early 2000s and the centralized cloud computing phase of the …

Oblivious transfer based on NTRUEncrypt

B Mi, D Huang, S Wan, L Mi, J Cao - IEEE Access, 2018 - ieeexplore.ieee.org
Oblivious transfer (OT) is the most fundamental process in cryptosystems and serves as the
basic building block for implementing protocols, such as the secure multi-party computation …

Towards indeterminacy-tolerant access control in iot

M Heydari, A Mylonas, V Katos, D Gritzalis - Handbook of Big Data and IoT …, 2019 - Springer
The ultimate goal of any access control system is to assign precisely the necessary level of
access (ie, no more and no less) to each subject. Meeting this goal is challenging in an …

Security and privacy challenges in healthcare using Internet of Things

R Tandon, PK Gupta - IoT-Based Data Analytics for the Healthcare Industry, 2021 - Elsevier
Abstract Internet of Things (IoT) has become one of the promising technologies for analyzing
and monitoring the health of patients. IoT technology has made it possible for networking …

Security and privacy for a sustainable internet of things

H Janicke, S Abuadbba, S Nepal - 2020 Second IEEE …, 2020 - ieeexplore.ieee.org
There has been an exponential growth of Internet-of-Things (IoT) devices and their
applications in a variety of" smart" services ranging from precision health, smart cities and …

A Continuous Object Tracking Scheme Based on Two-Stage Prediction in Industrial Internet of Things

R Fu, Y Bi, G Han, C Lin, H Zhao - IEEE Internet of Things …, 2023 - ieeexplore.ieee.org
Due to the poisonousness, explosiveness, and diffuseness of some continuous objects (eg,
toxic gas, nuclear radiation, and industrial dust), continuous object tracking has a pivotal role …

[HTML][HTML] Image encryption and decryption based on chaotic algorithm

Y Hu, R Tian - Journal of Applied Mathematics and Physics, 2020 - scirp.org
This paper analyzes the problems in image encryption and decryption based on chaos
theory. This article introduces the application of the two-stage Logistic algorithm in image …

Mod-k-chained variant of present and clefia lightweight block cipher for an improved security in internet of things

M Jangra, B Singh - SN Computer Science, 2022 - Springer
There is a need for low-cost cryptographic mechanisms that can solve security issues for
lightweight-applications like IoT. Lightweight cryptography uses an enormous number of …