Lightweight cryptography methods
While our conventional cryptography methods, such for AES (encryption), SHA-256
(hashing) and RSA/Elliptic Curve (signing), work well on systems which have reasonable …
(hashing) and RSA/Elliptic Curve (signing), work well on systems which have reasonable …
Cryptography algorithms for enhancing IoT security
In today's fast-paced world, a new technology paradigm known as the Internet of Things
(IoT) is advancing every business. It provides communication between the digital and …
(IoT) is advancing every business. It provides communication between the digital and …
Simpira v2: A family of efficient permutations using the AES round function
This paper introduces Simpira, a family of cryptographic permutations that supports inputs of
128 * b bits, where b is a positive integer. Its design goal is to achieve high throughput on …
128 * b bits, where b is a positive integer. Its design goal is to achieve high throughput on …
Secure PBFT consensus-based lightweight blockchain for healthcare application
P Hegde, PKR Maddikunta - Applied Sciences, 2023 - mdpi.com
Recent advancement in IoT technology has boosted the healthcare domain with enormous
usage of IoT devices to provide elevated services to patients with chronic disorders on a real …
usage of IoT devices to provide elevated services to patients with chronic disorders on a real …
IoT security: challenges and countermeasures
Internet of things (IoT) dramatically influences our daily lives in several domains, ranging
from teeny wearable devices to large industrial systems. IoT technology aims to enhance …
from teeny wearable devices to large industrial systems. IoT technology aims to enhance …
Identity in the Internet-of-Things (IoT): New challenges and opportunities
From digitization to datafication, Internet-of-Things (IoT) plays an important role as enabler in
the value creation process from big data. As is expected, security has naturally become one …
the value creation process from big data. As is expected, security has naturally become one …
Cube attacks on round-reduced TinyJAMBU
Lightweight cryptography has recently gained importance as the number of Internet of things
(IoT) devices connected to Internet grows. Its main goal is to provide cryptographic …
(IoT) devices connected to Internet grows. Its main goal is to provide cryptographic …
AdvParams: An active DNN intellectual property protection technique via adversarial perturbation based parameter encryption
The construction of Deep Neural Network (DNN) models requires high cost, thus a well-
trained DNN model can be considered as intellectual property (IP) of the model owner. To …
trained DNN model can be considered as intellectual property (IP) of the model owner. To …
Lightweight cryptography algorithms for internet of things enabled networks: An overview
Internet of Things is a worldwide set-up of interconnected entities that permits millions of
devices to communicate with each other. Combined with reliable communication, ensuring …
devices to communicate with each other. Combined with reliable communication, ensuring …
[图书][B] GDPR and Cyber Security for Business Information Systems
A Gobeo, C Fowler, WJ Buchanan - 2022 - taylorfrancis.com
The General Data Protection Regulation is the latest, and one of the most stringent,
regulations regarding Data Protection to be passed into law by the European Union …
regulations regarding Data Protection to be passed into law by the European Union …