Reconfigurable FPGA architectures: A survey and applications
P Babu, E Parthasarathy - Journal of The Institution of Engineers (India) …, 2021 - Springer
Reconfigurable computing is a potential paradigm which has been effectively performing
mostly in the developments of devices likely Field Programmable Gate Arrays (FPGAs). This …
mostly in the developments of devices likely Field Programmable Gate Arrays (FPGAs). This …
SUCCESSFUL DEPLOYMENT OF SECURE INTELLIGENT CONNECTIVITY FOR LAN AND WLAN
A Yaseen - Journal of Intelligent Connectivity and Emerging …, 2022 - questsquare.org
Abstract The paper explores Secure Intelligent Connectivity (SIC) for enhancing security in
Local Area Networks (LAN) and Wireless Local Area Networks (WLAN). It defines SIC …
Local Area Networks (LAN) and Wireless Local Area Networks (WLAN). It defines SIC …
Penetration testing: Concepts, attack methods, and defense strategies
M Denis, C Zena, T Hayajneh - 2016 IEEE Long Island Systems …, 2016 - ieeexplore.ieee.org
Penetration testing helps to secure networks, and highlights the security issues. In this paper
investigate different aspects of penetration testing including tools, attack methodologies, and …
investigate different aspects of penetration testing including tools, attack methodologies, and …
Image encryption method based on improved ECC and modified AES algorithm
A Hafsa, A Sghaier, J Malek, M Machhout - Multimedia Tools and …, 2021 - Springer
Currently, embedded systems can be found everywhere in quotidian life. In the development
of embedded systems, information security is one of the important factors. Encryption is an …
of embedded systems, information security is one of the important factors. Encryption is an …
Real-time video security system using chaos-improved advanced encryption standard (IAES)
A Hafsa, M Fradi, A Sghaier, J Malek… - Multimedia Tools and …, 2022 - Springer
Real-time multimedia applications are increasingly achieving success in the everyday world.
Thereby, multimedia information relies on security to protect private life. The Advanced …
Thereby, multimedia information relies on security to protect private life. The Advanced …
A review in recent development of network threats and security measures
Networks are vulnerable devices due to their basic feature of facilitating remote access and
data communication. The information in the networks needs to be kept secured and safe in …
data communication. The information in the networks needs to be kept secured and safe in …
[HTML][HTML] Secure authentication for remote patient monitoring with wireless medical sensor networks
There is broad consensus that remote health monitoring will benefit all stakeholders in the
healthcare system and that it has the potential to save billions of dollars. Among the major …
healthcare system and that it has the potential to save billions of dollars. Among the major …
[HTML][HTML] FPGA modeling and optimization of a SIMON lightweight block cipher
Security of sensitive data exchanged between devices is essential. Low-resource devices
(LRDs), designed for constrained environments, are increasingly becoming ubiquitous …
(LRDs), designed for constrained environments, are increasingly becoming ubiquitous …
An investigation of Bluetooth security vulnerabilities
P Cope, J Campbell, T Hayajneh - 2017 IEEE 7th annual …, 2017 - ieeexplore.ieee.org
As Bluetooth technology has evolved and improved over the years, it has gained
widespread acceptance and is increasingly found in many aspects of everyday life. It's …
widespread acceptance and is increasingly found in many aspects of everyday life. It's …
Detection and prevention of crypto-ransomware
D Gonzalez, T Hayajneh - 2017 IEEE 8th Annual Ubiquitous …, 2017 - ieeexplore.ieee.org
Crypto-ransomware is a challenging threat that ciphers a user's files while hiding the
decryption key until a ransom is paid by the victim. This type of malware is a lucrative …
decryption key until a ransom is paid by the victim. This type of malware is a lucrative …