A fuzzy ontology-based context-aware encryption approach in IoT through device and information classification
IoT devices produce a vast amount of data ranging from personal to sensitive information.
Usually, these devices remain connected to the internet so protecting the information …
Usually, these devices remain connected to the internet so protecting the information …
[PDF][PDF] Cryptography as a dual-faceted instrument of security and vulnerability
M Iavich, S Simonovi, T Okhrimenko - 2024 - ceur-ws.org
Cryptography is an important field dedicated to securing data transmission through
advanced algorithms and techniques. Everyday applications of cryptographic algorithms …
advanced algorithms and techniques. Everyday applications of cryptographic algorithms …
[PDF][PDF] The evolution of digital signatures: From classical to post-quantum
M Iavich - 2024 - ceur-ws.org
The paper investigates the vulnerability of classical digital signatures, particularly RSA, in
the face of advancing quantum computing. Shor's algorithm, which is capable of efficiently …
the face of advancing quantum computing. Shor's algorithm, which is capable of efficiently …
A Fuzzy Ontology-based Context-aware Encryption approach in IoT through Device and Information Classification
IoT devices produce a vast amount of data ranging from personal to sensitive information.
Usually, these devices remain connected to the internet so protecting the information …
Usually, these devices remain connected to the internet so protecting the information …