A comprehensive study of security and cyber-security risk management within e-Health systems: Synthesis, analysis and a novel quantified approach
Abstract Internet of Things (IoT) applications are among the major trends of nowadays.
Billions of connected devices are creating great business profits and performing a multitude …
Billions of connected devices are creating great business profits and performing a multitude …
Prisec: Comparison of symmetric key algorithms for iot devices
DAF Saraiva, VRQ Leithardt, D de Paula… - Sensors, 2019 - mdpi.com
With the growing number of heterogeneous resource-constrained devices connected to the
Internet, it becomes increasingly challenging to secure the privacy and protection of data …
Internet, it becomes increasingly challenging to secure the privacy and protection of data …
[PDF][PDF] An extensive review on IoT security challenges and LWC implementation on tiny hardware for node level security evaluation
Internet-of-Things (IoT) offers a novel intelligent ecosystem that consists of various physical
objects interconnected via the internet, which draws the attention of researchers …
objects interconnected via the internet, which draws the attention of researchers …
The role of IoT in digital governance
The acronym IoT stands for internet of things. The IoT ecosystem can be envisioned as a set
of physical electronic devices embedded with intelligence, connected through a network …
of physical electronic devices embedded with intelligence, connected through a network …
Secure IoT e-Health applications using VICINITY framework and GDPR guidelines
M Koutli, N Theologou, A Tryferidis… - … Computing in Sensor …, 2019 - ieeexplore.ieee.org
In this work we analyze the security requirements and challenges of e-Health Internet of
Things (IoT) applications and propose a complete architecture to address them. This …
Things (IoT) applications and propose a complete architecture to address them. This …
Internet of Things fermatean fuzzy CRITIC testing procedure for new normal
Digital disruption was crucial to corporate success even before COVID-19 pandemic. The
need for speed digitization has grown even more pressing since the pandemic broke out …
need for speed digitization has grown even more pressing since the pandemic broke out …
[PDF][PDF] Comparative analysis of secured hash algorithms for blockchain technology and internet of things
Information Security and Management. To test the credibility, reliability of metadata
exchanged between the sender and the recipient party of IoT applications different …
exchanged between the sender and the recipient party of IoT applications different …
[PDF][PDF] Modified round function of SIMECK 32/64 block cipher
PC Encarnacion, BD Gerardo… - Int. J. Adv. Trends …, 2020 - academia.edu
ABSTRACT Lightweight Block Cipher's (LBC) various algorithms need to meet the security
requirements for all resource-constrained devices and Internet of Things (IoT) technologies …
requirements for all resource-constrained devices and Internet of Things (IoT) technologies …
[PDF][PDF] Advanced Optimized Anomaly Detection System for IoT Cyberattacks Using Artificial Intelligence.
While emerging technologies such as the Internet of Things (IoT) have many benefits, they
also pose considerable security challenges that require innovative solutions, including those …
also pose considerable security challenges that require innovative solutions, including those …
[PDF][PDF] An efficient lightweight key exchange algorithm for internet of things applications
FK Ali, S Mathew - International Journal of Electrical and Computer …, 2022 - academia.edu
Internet of things (IoT) gained wide popularity in recent years, and this is proved by
tremendous increase in use of IoT applications worldwide. Distributed IoT applications can …
tremendous increase in use of IoT applications worldwide. Distributed IoT applications can …