A Review of Lightweight Security and Privacy for Resource-Constrained IoT Devices
The widespread and growing interest in the Internet of Things (IoT) may be attributed to its
usefulness in many different fields. Physical settings are probed for data, which is then …
usefulness in many different fields. Physical settings are probed for data, which is then …
SAILFISH-I: a lightweight block cipher for cloud-enabled fog devices
D Agarwal, S Gurele… - 2022 IEEE 6th Conference …, 2022 - ieeexplore.ieee.org
The modern era of computation claims high-speed data transmission, greater performance,
and maximizing efficiency using fog devices, faster internet, and decentralized technology …
and maximizing efficiency using fog devices, faster internet, and decentralized technology …
[PDF][PDF] Wireless Network Safety Status Prediction Based on Fuzzy Logic
X Xue, Y Zheng, C Lu - Journal of Cyber Security and …, 2023 - journals.riverpublishers.com
In WN environment, network safety status means to state of information managing in various
WN environments, WN transmission information safety status assessment is one of primary …
WN environments, WN transmission information safety status assessment is one of primary …
A lightweight block cipher for cloud-based healthcare systems
HS Lamkuche, K Singh, K Shirkhedkar - International Conference on …, 2022 - Springer
The expansion of remote-based digital healthcare-based IoT systems has accelerated the
transfer of medical data through the IoT platform. This study proposes a unique model based …
transfer of medical data through the IoT platform. This study proposes a unique model based …
Performance and security analysis using B-128 modified blowfish algorithm
Abstract Information security is a domain having extensive applications in the twenty-first
century and beyond. Encryption is a technique used to prevent data from being accessed …
century and beyond. Encryption is a technique used to prevent data from being accessed …
Telecommunication stocks prediction using long short-term memory model neural network
N Jhanwar, P Goel, H Lamkuche - International Conference on Computing …, 2022 - Springer
This study looks at how LSTM networks can be used to predict destiny stock fee patterns
primarily based on fee history and technical evaluation. To achieve this, a methodology was …
primarily based on fee history and technical evaluation. To achieve this, a methodology was …
An anonymous authentication with blockchain assisted ring-based homomorphic encryption for enhancing security in cloud computing
Nowadays, the need for cloud computing has increased due to the exponential growth in
information transmission. Cybercriminals are persistent in their efforts to breach cloud …
information transmission. Cybercriminals are persistent in their efforts to breach cloud …
Construction of embedded online teaching platform based on AES-RSA encryption algorithm
X Kong, G Yue - Discover Artificial Intelligence, 2024 - Springer
With the development of economy, people's demand for high-quality and diversified
educational resources increases. However, under the frequent occurrence of network …
educational resources increases. However, under the frequent occurrence of network …
EdgeShield: Attack resistant secure and privacy-aware remote sensing image retrieval system for military and geological applications using edge computing
A Amaithi Rajan, VV - Earth Science Informatics, 2024 - Springer
The increasing production and processing of image data, especially in remote sensing
applications, has raised concerns regarding image security, privacy, and efficient retrieval as …
applications, has raised concerns regarding image security, privacy, and efficient retrieval as …
Accelerating Blake3 in RISC-V
X Zou, Y Peng, T Li, L Kong, Z Pang… - 2023 2nd International …, 2023 - ieeexplore.ieee.org
This paper proposes a novel hardware design to accelerate the Blake3 hash algorithm, a
cryptographic hash function, on RISC-V architecture, using both vector extension (V1. 0) and …
cryptographic hash function, on RISC-V architecture, using both vector extension (V1. 0) and …