A survey on routing protocols supported by the Contiki Internet of things operating system

YB Zikria, MK Afzal, F Ishmanov, SW Kim… - Future Generation …, 2018 - Elsevier
Standardization and technology advancements have helped the realization of the Internet of
things (IoT). The availability of low-cost IoT devices has also played a key role in furthering …

BSN-Care: A secure IoT-based modern healthcare system using body sensor network

P Gope, T Hwang - IEEE sensors journal, 2015 - ieeexplore.ieee.org
Advances in information and communication technologies have led to the emergence of
Internet of Things (IoT). In the modern health care environment, the usage of IoT …

Authenticated encryption schemes: A systematic review

MA Jimale, MR Z'aba, MLBM Kiah, MYI Idris… - IEEE …, 2022 - ieeexplore.ieee.org
Authenticated encryption (AE) is a cryptographic construction that simultaneously protects
confidentiality and integrity. A considerable amount of research has been devoted to the …

Message-locked encryption and secure deduplication

M Bellare, S Keelveedhi, T Ristenpart - … on the theory and applications of …, 2013 - Springer
We formalize a new cryptographic primitive that we call Message-Locked Encryption (MLE),
where the key under which encryption and decryption are performed is itself derived from …

A secure IoT-based modern healthcare system with fault-tolerant decision making process

P Gope, Y Gheraibia, S Kabir… - IEEE Journal of …, 2020 - ieeexplore.ieee.org
The advent of Internet of Things (IoT) has escalated the information sharing among various
smart devices by many folds, irrespective of their geographical locations. Recently …

Breaking symmetric cryptosystems using quantum period finding

M Kaplan, G Leurent, A Leverrier… - Advances in Cryptology …, 2016 - Springer
Due to Shor's algorithm, quantum computers are a severe threat for public key cryptography.
This motivated the cryptographic community to search for quantum-safe solutions. On the …

[图书][B] Cryptography engineering: design principles and practical applications

N Ferguson, B Schneier, T Kohno - 2011 - books.google.com
The ultimate guide to cryptography, updated from an author team of the world's top
cryptography experts. Cryptography is vital to keeping information safe, in an era when the …

A key-management scheme for distributed sensor networks

L Eschenauer, VD Gligor - Proceedings of the 9th ACM Conference on …, 2002 - dl.acm.org
Distributed Sensor Networks (DSNs) are ad-hoc mobile networks that include sensor nodes
with limited computation and communication capabilities. DSNs are dynamic in the sense …

Scalable and efficient provable data possession

G Ateniese, R Di Pietro, LV Mancini… - Proceedings of the 4th …, 2008 - dl.acm.org
Storage outsourcing is a rising trend which prompts a number of interesting security issues,
many of which have been extensively investigated in the past. However, Provable Data …

FPGA intrinsic PUFs and their use for IP protection

J Guajardo, SS Kumar, GJ Schrijen, P Tuyls - Cryptographic Hardware and …, 2007 - Springer
In recent years, IP protection of FPGA hardware designs has become a requirement for
many IP vendors. In [34], Simpson and Schaumont proposed a fundamentally different …