A survey on routing protocols supported by the Contiki Internet of things operating system
Standardization and technology advancements have helped the realization of the Internet of
things (IoT). The availability of low-cost IoT devices has also played a key role in furthering …
things (IoT). The availability of low-cost IoT devices has also played a key role in furthering …
BSN-Care: A secure IoT-based modern healthcare system using body sensor network
P Gope, T Hwang - IEEE sensors journal, 2015 - ieeexplore.ieee.org
Advances in information and communication technologies have led to the emergence of
Internet of Things (IoT). In the modern health care environment, the usage of IoT …
Internet of Things (IoT). In the modern health care environment, the usage of IoT …
Authenticated encryption schemes: A systematic review
Authenticated encryption (AE) is a cryptographic construction that simultaneously protects
confidentiality and integrity. A considerable amount of research has been devoted to the …
confidentiality and integrity. A considerable amount of research has been devoted to the …
Message-locked encryption and secure deduplication
We formalize a new cryptographic primitive that we call Message-Locked Encryption (MLE),
where the key under which encryption and decryption are performed is itself derived from …
where the key under which encryption and decryption are performed is itself derived from …
A secure IoT-based modern healthcare system with fault-tolerant decision making process
The advent of Internet of Things (IoT) has escalated the information sharing among various
smart devices by many folds, irrespective of their geographical locations. Recently …
smart devices by many folds, irrespective of their geographical locations. Recently …
Breaking symmetric cryptosystems using quantum period finding
Due to Shor's algorithm, quantum computers are a severe threat for public key cryptography.
This motivated the cryptographic community to search for quantum-safe solutions. On the …
This motivated the cryptographic community to search for quantum-safe solutions. On the …
[图书][B] Cryptography engineering: design principles and practical applications
N Ferguson, B Schneier, T Kohno - 2011 - books.google.com
The ultimate guide to cryptography, updated from an author team of the world's top
cryptography experts. Cryptography is vital to keeping information safe, in an era when the …
cryptography experts. Cryptography is vital to keeping information safe, in an era when the …
A key-management scheme for distributed sensor networks
L Eschenauer, VD Gligor - Proceedings of the 9th ACM Conference on …, 2002 - dl.acm.org
Distributed Sensor Networks (DSNs) are ad-hoc mobile networks that include sensor nodes
with limited computation and communication capabilities. DSNs are dynamic in the sense …
with limited computation and communication capabilities. DSNs are dynamic in the sense …
Scalable and efficient provable data possession
Storage outsourcing is a rising trend which prompts a number of interesting security issues,
many of which have been extensively investigated in the past. However, Provable Data …
many of which have been extensively investigated in the past. However, Provable Data …
FPGA intrinsic PUFs and their use for IP protection
J Guajardo, SS Kumar, GJ Schrijen, P Tuyls - Cryptographic Hardware and …, 2007 - Springer
In recent years, IP protection of FPGA hardware designs has become a requirement for
many IP vendors. In [34], Simpson and Schaumont proposed a fundamentally different …
many IP vendors. In [34], Simpson and Schaumont proposed a fundamentally different …