A survey on energy-aware security mechanisms

A Merlo, M Migliardi, L Caviglione - Pervasive and Mobile Computing, 2015 - Elsevier
The increasing adoption of mobile devices as the preferred tool to access the Internet
imposes to deepen the investigation of security aspects. In parallel, their power constrained …

An efficient and secured framework for mobile cloud computing

IA Elgendy, WZ Zhang, CY Liu… - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
Smartphone devices are widely used in our daily lives. However, these devices exhibit
limitations, such as short battery lifetime, limited computation power, small memory size and …

Toward energy efficient microcontrollers and Internet-of-Things systems

MM Al-Kofahi, MY Al-Shorman, OM Al-Kofahi - Computers & Electrical …, 2019 - Elsevier
In this paper, energy consumption of five common microcontroller (MCU) boards running a
set of common functions and operations is studied. This includes a study of changing clock …

A context-aware encryption protocol suite for edge computing-based IoT devices

Z Dar, A Ahmad, FA Khan, F Zeshan, R Iqbal… - The Journal of …, 2020 - Springer
Heterogeneous devices are connected with each other through wireless links within a cyber
physical system. These devices undergo resource constraints such as battery, bandwidth …

Performance analysis of symmetric key cryptographic algorithms

S Vyakaranal, S Kengond - 2018 international conference on …, 2018 - ieeexplore.ieee.org
Data's security being important aspect of the today's internet is gaining more importance day
by day. With the increase in online data exchange, transactions and payments; secure …

[PDF][PDF] An efficient framework to improve the performance of mobile applications

IA Elgendy, M El-kawkagy, A Keshk - Int. J. Digit. Content Technol …, 2015 - academia.edu
Recently, Smartphones capabilities are increasing continuously. As a result, developers
trend to build complex applications such as augmented reality, face detection, video editing …

Achieving energy efficiency using novel scalar multiplication based ECC for android devices in Internet of Things environments

KS Kumar, R Sukumar - Cluster Computing, 2019 - Springer
In the era of Internet of Things (IoT) infrastructure, Secured information transfer is
necessitated between mobile and internet based services in IoT environments. As IoT …

Application of bio-inspired methods in distributed gaming systems

M Woźniak, D Połap, C Napoli, E Tramontana - Information Technology and …, 2017 - itc.ktu.lt
In this paper we present an application of Computational Intelligence methods in gaming
systems. We have applied Bio-Inspired Methods to automatically create various maze …

[PDF][PDF] Comparison of steepest descent method and conjugate gradient method.

O Osadcha, Z Marszaek - SYSTEM, 2017 - ceur-ws.org
This paper illustrates comparison of two methods, which are used for solving systems of
linear equations. The aim of the research is to analyze, which method is faster solve this …

Design and implementation of Energy Efficient Lightweight Encryption (EELWE) algorithm for medical applications

RR Chintala, S Venkateswarlu - arXiv preprint arXiv:2103.04889, 2021 - arxiv.org
Proportional to the growth in the usage of Human Sensor Networks (HSN), the volume of the
data exchange between Sensor devices is increasing at a rapid pace. In this paper, we have …