A survey on energy-aware security mechanisms
A Merlo, M Migliardi, L Caviglione - Pervasive and Mobile Computing, 2015 - Elsevier
The increasing adoption of mobile devices as the preferred tool to access the Internet
imposes to deepen the investigation of security aspects. In parallel, their power constrained …
imposes to deepen the investigation of security aspects. In parallel, their power constrained …
An efficient and secured framework for mobile cloud computing
Smartphone devices are widely used in our daily lives. However, these devices exhibit
limitations, such as short battery lifetime, limited computation power, small memory size and …
limitations, such as short battery lifetime, limited computation power, small memory size and …
Toward energy efficient microcontrollers and Internet-of-Things systems
In this paper, energy consumption of five common microcontroller (MCU) boards running a
set of common functions and operations is studied. This includes a study of changing clock …
set of common functions and operations is studied. This includes a study of changing clock …
A context-aware encryption protocol suite for edge computing-based IoT devices
Heterogeneous devices are connected with each other through wireless links within a cyber
physical system. These devices undergo resource constraints such as battery, bandwidth …
physical system. These devices undergo resource constraints such as battery, bandwidth …
Performance analysis of symmetric key cryptographic algorithms
S Vyakaranal, S Kengond - 2018 international conference on …, 2018 - ieeexplore.ieee.org
Data's security being important aspect of the today's internet is gaining more importance day
by day. With the increase in online data exchange, transactions and payments; secure …
by day. With the increase in online data exchange, transactions and payments; secure …
[PDF][PDF] An efficient framework to improve the performance of mobile applications
IA Elgendy, M El-kawkagy, A Keshk - Int. J. Digit. Content Technol …, 2015 - academia.edu
Recently, Smartphones capabilities are increasing continuously. As a result, developers
trend to build complex applications such as augmented reality, face detection, video editing …
trend to build complex applications such as augmented reality, face detection, video editing …
Achieving energy efficiency using novel scalar multiplication based ECC for android devices in Internet of Things environments
KS Kumar, R Sukumar - Cluster Computing, 2019 - Springer
In the era of Internet of Things (IoT) infrastructure, Secured information transfer is
necessitated between mobile and internet based services in IoT environments. As IoT …
necessitated between mobile and internet based services in IoT environments. As IoT …
Application of bio-inspired methods in distributed gaming systems
In this paper we present an application of Computational Intelligence methods in gaming
systems. We have applied Bio-Inspired Methods to automatically create various maze …
systems. We have applied Bio-Inspired Methods to automatically create various maze …
[PDF][PDF] Comparison of steepest descent method and conjugate gradient method.
O Osadcha, Z Marszaek - SYSTEM, 2017 - ceur-ws.org
This paper illustrates comparison of two methods, which are used for solving systems of
linear equations. The aim of the research is to analyze, which method is faster solve this …
linear equations. The aim of the research is to analyze, which method is faster solve this …
Design and implementation of Energy Efficient Lightweight Encryption (EELWE) algorithm for medical applications
RR Chintala, S Venkateswarlu - arXiv preprint arXiv:2103.04889, 2021 - arxiv.org
Proportional to the growth in the usage of Human Sensor Networks (HSN), the volume of the
data exchange between Sensor devices is increasing at a rapid pace. In this paper, we have …
data exchange between Sensor devices is increasing at a rapid pace. In this paper, we have …