A review on security implementations in soft-processors for IoT applications

MA Caraveo-Cacep, R Vázquez-Medina… - Computers & Security, 2024 - Elsevier
With the increase in the number of devices connected to the Internet, the need to maintain
and harden information security in Internet systems has significantly increased. This has led …

High-Performance Implementation of the Identity-Based Signature Scheme in IEEE P1363 on GPU

X Hu, D He, M Luo, C Peng, Q Feng… - ACM Transactions on …, 2023 - dl.acm.org
Identity-based cryptography is proposed to solve the complicated certificate management of
traditional public-key cryptography. The pairing computation and high-level tower extension …

Edge Intelligence-Assisted Asymmetrical Network Control and Video Decoding in the Industrial IoT with Speculative Parallelization

S Yang, Z Zhang, H Xia, Y Li, Z Liu - Symmetry, 2023 - mdpi.com
Industrial Internet of Things (IIoTs) has drawn significant attention in the industry. Among its
rich applications, the field's video surveillance deserves particular interest due to its …

TEGRAS: An efficient Tegra embedded GPU-based RSA acceleration server

J Dong, G Fan, F Zheng, T Mao… - IEEE Internet of Things …, 2022 - ieeexplore.ieee.org
Industrial Internet of Things (IIoT) has strict requirements on the performance and security of
devices. Public-key cryptography, as a kind of computing resource-consuming algorithm, is …

A Comparative Study Between External USB and MIPI CSI for Medical Imaging and a Device Driver Implementation for Endoscope Camera Using USB

H Mewada, LS Sundar, P Engineer… - 2023 4th International …, 2023 - ieeexplore.ieee.org
As mobile processor technology is evolving, multitasking has become the matter of a one
finger touch. But unfortunately, this technology has not been used on a larger scale in a …