Flexible temperature sensors
R Liu, L He, M Cao, Z Sun, R Zhu, Y Li - Frontiers in Chemistry, 2021 - frontiersin.org
Temperature reflects the balance between production and dissipate of heat. Flexible
temperature sensors are primary sensors used for temperature monitoring. To obtain real …
temperature sensors are primary sensors used for temperature monitoring. To obtain real …
A review on security implementations in soft-processors for IoT applications
MA Caraveo-Cacep, R Vázquez-Medina… - Computers & Security, 2024 - Elsevier
With the increase in the number of devices connected to the Internet, the need to maintain
and harden information security in Internet systems has significantly increased. This has led …
and harden information security in Internet systems has significantly increased. This has led …
Area-Efficient Realization of Binary Elliptic Curve Point Multiplication Processor for Cryptographic Applications
This paper proposes a novel hardware design for a compact crypto processor devoted to
elliptic-curve point multiplication over GF (2 233). We focus on minimizing hardware usage …
elliptic-curve point multiplication over GF (2 233). We focus on minimizing hardware usage …
Hardware–software co-design framework for data encryption in image processing systems for the Internet of Things environment
Data protection is a severe constraint in the heterogeneous IoT era. This article presents a
hardware–software cosimulation of AES-128 bit encryption and decryption for IoT edge …
hardware–software cosimulation of AES-128 bit encryption and decryption for IoT edge …
A review on fpga implementation of lightweight cryptography for wireless sensor network
B Sreehari, V Sankar, RS Lopez… - 2023 International …, 2023 - ieeexplore.ieee.org
Wireless sensor networks (WSNs) have become increasingly popular in recent years due to
their ability to remotely monitor and gather data in a variety of applications. The frequent …
their ability to remotely monitor and gather data in a variety of applications. The frequent …
Hardware Software Co-Simulation of an AES-128 based data encryption in image processing systems for the internet of things environment
Security of the data is a major challenge in the deployment and management of the Internet
of Things (IoT) systems in the heterogeneous environment, where data gets transferred very …
of Things (IoT) systems in the heterogeneous environment, where data gets transferred very …
SINT: Toward a Blockchain-Based Secure In-Band Network Telemetry Architecture
The foundation of network management is to timely, accurately, and flexibly monitor the
status of a managed network. Recently, In-band Network Telemetry (INT) has presented its …
status of a managed network. Recently, In-band Network Telemetry (INT) has presented its …
Performance Analysis of Enhanced AES-128 and Blowfish Algorithms Through Parallel-Pipelined-Memory Techniques
Currently, the advanced encryption standard (AES)-128 algorithm is deployed by the
Institute of Electrical and Electronics Engineers standards, and it is widely used to secure …
Institute of Electrical and Electronics Engineers standards, and it is widely used to secure …
An Optimized Flexible Accelerator for Elliptic Curve Point Multiplication over NIST Binary Fields
This article proposes a flexible hardware accelerator optimized from a throughput and area
point of view for the computationally intensive part of elliptic curve cryptography. The target …
point of view for the computationally intensive part of elliptic curve cryptography. The target …
Power Optimization in Wireless Sensor Network Using VLSI Technique on FPGA Platform
S Leelakrishnan, A Chakrapani - Neural Processing Letters, 2024 - Springer
Nowadays, the demand for high-performance wireless sensor networks (WSN) is increasing,
and its power requirement has threatened the survival of WSN. The routing methods cannot …
and its power requirement has threatened the survival of WSN. The routing methods cannot …