Digital forensic investigation framework for the metaverse
The Metaverse is currently becoming a massive technology platform and is considered to be
the next significant development in global technology and business landscapes. The …
the next significant development in global technology and business landscapes. The …
[PDF][PDF] An extensive review on IoT security challenges and LWC implementation on tiny hardware for node level security evaluation
Internet-of-Things (IoT) offers a novel intelligent ecosystem that consists of various physical
objects interconnected via the internet, which draws the attention of researchers …
objects interconnected via the internet, which draws the attention of researchers …
[PDF][PDF] Quality Assurance in Digital Forensic Investigations: Optimal Strategies and Emerging Innovations
A Iftikhar, R Farooq, M Mumtaz, S Hussain… - Austin J Forensic Sci …, 2023 - researchgate.net
Digital forensic investigations are critical in modern law enforcement, cybersecurity, and
legal proceedings. Ensuring digital evidence's accuracy, integrity, and reliability is …
legal proceedings. Ensuring digital evidence's accuracy, integrity, and reliability is …
[HTML][HTML] In-depth study of lightweight block ciphers: Performance assessment and implementation on sensor motes
A Hkiri, M Karmani, FH Alasmary, OB Bahri… - Alexandria Engineering …, 2025 - Elsevier
In the rapidly evolving landscape of the Internet of Things (IoT) and Wireless Sensor
Networks (WSN), the need for secure and efficient data transmission is paramount. Block …
Networks (WSN), the need for secure and efficient data transmission is paramount. Block …
Side channel resistance at a cost: A comparison of arx-based authenticated encryption
F Coleman, B Rezvani, S Sachin… - 2020 30th International …, 2020 - ieeexplore.ieee.org
Lightweight cryptography offers viable security solutions for resource constrained Internet of
Things (IoT) devices. However, IoT devices have implementation vulnerabilities such as side …
Things (IoT) devices. However, IoT devices have implementation vulnerabilities such as side …
FPGA implementation of random number generator using LFSR and scrambling algorithm for lightweight cryptography
ABSTRACT The IoT (Internet of Things) is a network of devices that are interconnected and
are uniquely addressable, based on common communication protocols and links to perform …
are uniquely addressable, based on common communication protocols and links to perform …
[PDF][PDF] Modified round function of SIMECK 32/64 block cipher
PC Encarnacion, BD Gerardo… - Int. J. Adv. Trends …, 2020 - academia.edu
ABSTRACT Lightweight Block Cipher's (LBC) various algorithms need to meet the security
requirements for all resource-constrained devices and Internet of Things (IoT) technologies …
requirements for all resource-constrained devices and Internet of Things (IoT) technologies …
[PDF][PDF] Modified Key Derivation Function for Enhanced Security of Speck in Resource-Constrained Internet of Things
RAF Lustro - International Journal of Computer Network and …, 2021 - researchgate.net
Randomness is an imperative component in every cryptographic algorithm to guarantee
secret keys are unpredictable and secured against all forms of attacks. Speck generated …
secret keys are unpredictable and secured against all forms of attacks. Speck generated …
[PDF][PDF] A lightweight encryption algorithm to secure iot devices
RMA Al_Azzawi, SSM Al-Dabbagh - MINAR Int. J. Appl. Sci …, 2023 - minarjournal.com
Lightweight cryptography is an effective solution for ensuring confidentiality and privacy in
resource-constrained environments, particularly in Internet of Things (IoT) systems. These …
resource-constrained environments, particularly in Internet of Things (IoT) systems. These …
[PDF][PDF] An Anti-Physical Attack Scheme of ARX Lightweight Algorithms for IoT Applications.
Q Zhi, X Jiang, H Zhang, Z Zhou, J Ren… - Comput. Syst. Sci …, 2023 - researchgate.net
(ARX) operation has attracted much attention due to its high software affinity and fast
operation speed. However, lacking an effective defense scheme for physical attacks limits …
operation speed. However, lacking an effective defense scheme for physical attacks limits …