A Review of Lightweight Security and Privacy for Resource-Constrained IoT Devices

S Kumar, D Kumar, R Dangi, G Choudhary… - … Materials and Continua, 2024 - orbit.dtu.dk
The widespread and growing interest in the Internet of Things (IoT) may be attributed to its
usefulness in many different fields. Physical settings are probed for data, which is then …

SAILFISH-I: a lightweight block cipher for cloud-enabled fog devices

D Agarwal, S Gurele… - 2022 IEEE 6th Conference …, 2022 - ieeexplore.ieee.org
The modern era of computation claims high-speed data transmission, greater performance,
and maximizing efficiency using fog devices, faster internet, and decentralized technology …

[PDF][PDF] Wireless Network Safety Status Prediction Based on Fuzzy Logic

X Xue, Y Zheng, C Lu - Journal of Cyber Security and …, 2023 - journals.riverpublishers.com
In WN environment, network safety status means to state of information managing in various
WN environments, WN transmission information safety status assessment is one of primary …

A lightweight block cipher for cloud-based healthcare systems

HS Lamkuche, K Singh, K Shirkhedkar - International Conference on …, 2022 - Springer
The expansion of remote-based digital healthcare-based IoT systems has accelerated the
transfer of medical data through the IoT platform. This study proposes a unique model based …

Performance and security analysis using B-128 modified blowfish algorithm

S Kumar, D Kumar, N Singh - Multimedia Tools and Applications, 2023 - Springer
Abstract Information security is a domain having extensive applications in the twenty-first
century and beyond. Encryption is a technique used to prevent data from being accessed …

Telecommunication stocks prediction using long short-term memory model neural network

N Jhanwar, P Goel, H Lamkuche - International Conference on Computing …, 2022 - Springer
This study looks at how LSTM networks can be used to predict destiny stock fee patterns
primarily based on fee history and technical evaluation. To achieve this, a methodology was …

An anonymous authentication with blockchain assisted ring-based homomorphic encryption for enhancing security in cloud computing

P Shrivastava, B Alam, M Alam - Cluster Computing, 2024 - Springer
Nowadays, the need for cloud computing has increased due to the exponential growth in
information transmission. Cybercriminals are persistent in their efforts to breach cloud …

Construction of embedded online teaching platform based on AES-RSA encryption algorithm

X Kong, G Yue - Discover Artificial Intelligence, 2024 - Springer
With the development of economy, people's demand for high-quality and diversified
educational resources increases. However, under the frequent occurrence of network …

EdgeShield: Attack resistant secure and privacy-aware remote sensing image retrieval system for military and geological applications using edge computing

A Amaithi Rajan, VV - Earth Science Informatics, 2024 - Springer
The increasing production and processing of image data, especially in remote sensing
applications, has raised concerns regarding image security, privacy, and efficient retrieval as …

Accelerating Blake3 in RISC-V

X Zou, Y Peng, T Li, L Kong, Z Pang… - 2023 2nd International …, 2023 - ieeexplore.ieee.org
This paper proposes a novel hardware design to accelerate the Blake3 hash algorithm, a
cryptographic hash function, on RISC-V architecture, using both vector extension (V1. 0) and …