We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 1-20 of 32 results
  1. An improved chacha algorithm for securing data on IoT devices

    In recent years, revolution of development was exceedingly quick in the Internet. Nevertheless, instead of only linking personal computers, mobiles...

    Mohammed Salih Mahdi, Nidaa Falih Hassan, Ghassan H. Abdul-Majeed in SN Applied Sciences
    Article Open access 06 March 2021
  2. SAT-Based Cryptanalysis of Salsa20 Cipher

    Modeling through Boolean encoding is often used for the investigation of various kinds of algorithms or other computer systems. Such an approach can...
    Sylwia Stachowiak, Mirosław Kurkowski, Artur Soboń in Progress in Image Processing, Pattern Recognition and Communication Systems
    Conference paper 2022
  3. CCSC—DHKEP: Data Confidentiality Using Improved Security Approaches in Cloud Environment

    With the rapid advancement in the mobile and computing technologies, individuals have an inclination to depend more on them in varied range of...

    L. Prabahar, R. Sukumar, R. SureshBabu in Wireless Personal Communications
    Article 15 September 2021
  4. Lightweight Block Cipher for Resource Constrained IoT Environment—An Survey, Performance, Cryptanalysis and Research Challenges

    Nowadays IoT (Internet of Things) is becoming a more popular environment and has a variety of applications like Smart Home, Smart Healthcare,...
    Conference paper 2023
  5. State-of-the-Art Lightweight Cryptographic Protocols for IoT Networks

    Due to technical improvements, the Internet of Things has enabled the networking of devices capable of collecting vast volumes of data. Consequently,...
    Conference paper 2023
  6. Comprehensive Study of Existing Stream Ciphers

    Now a day’s internet of things is one of the rapidly growing research field in the information technology domain. Offering security for this...
    S. Chaithanya, V. Anitha in Inventive Computation Technologies
    Conference paper 2020
  7. Lightweight Cryptography

    Cryptography has become indispensable in protecting sensitive communication, data, and personal information. However, most conventional encryption...
    Mark Tehranipoor, Nitin Pundir, ... Farimah Farahmandi in Hardware Security Primitives
    Chapter 2023
  8. Secure and Efficient Transmission of Vision-Based Feedback Control Signals

    An ever-increasing number of autonomous vehicles use bandwidth-greedy sensors such as cameras and LiDARs to sense and act to the world around us....

    Øystein Volden, Petter Solnør, ... Thor I. Fossen in Journal of Intelligent & Robotic Systems
    Article Open access 09 September 2021
  9. Evaluation of the Recommended Algorithms in the Internet of Things

    In the recent revolution of exchanging information, more and more objects (things) become in need of a media that allows them to talk to each other....
    Emad R. Gadalla, Omar M. Sallabi, ... Abdulrahman A. A. Emhemed in Artificial Intelligence of Things for Smart Green Energy Management
    Chapter 2022
  10. A multi-layer composite identification scheme of cryptographic algorithm based on hybrid random forest and logistic regression model

    Cryptographic technology can effectively defend against malicious attackers to attack sensitive and private information. The core of cryptographic...

    Ke Yuan, Yabing Huang, ... Chunfu Jia in Complex & Intelligent Systems
    Article Open access 21 August 2023
  11. Even symmetric chaotic and skewed maps as a technique in video encryption

    The massive growth and use of digital multimedia through computer networks, including video and images, have increased the demand for protecting this...

    B. M. El-den, Walid A. Raslan, Ahmed A. Abdullah in EURASIP Journal on Advances in Signal Processing
    Article Open access 06 April 2023
  12. Blockchain for IoT: A Comprehensive Review for Precision Agricultural Networks

    Internet of Things (IoT) has gained popularity in recent years due to the services it offers and its wide usage in the field of science and...
    Abhiudhaya Upadhyaya, Yashwant Singh, Pooja Anand in Proceedings of International Conference on Recent Innovations in Computing
    Conference paper 2023
  13. Fault Attack

    Fault attacks are a well-studied topic in the area of attacks on cryptography. They constitute a powerful tool to recover the secret key used in the...
    Chapter 2022
  14. IECA: an efficient IoT friendly image encryption technique using programmable cellular automata

    Digital images play a vital role in multimedia communications in the modern era. With the advent of internet-of-things (IoT) applications, multimedia...

    Satyabrata Roy, Umashankar Rawat, ... Sanjeet Kumar Nayak in Journal of Ambient Intelligence and Humanized Computing
    Article 28 February 2020
  15. Edge Crypt-Pi: Securing Internet of Things with Light and Fast Crypto-Processor

    In the IoT and edge computing landscape, security has increasingly become one of the critical design considerations. Due to that most of these...
    Mohamed El-Hadedy, **nfei Guo, ... Wen-Mei Hwu in Proceedings of the Future Technologies Conference (FTC) 2020, Volume 3
    Conference paper 2021
  16. Security Techniques Implementation on Big Data Using Steganography and Cryptography

    The COVID-19 pandemic has increased everyone’s exposure to the Internet thus there has been an addition of new people who now access the Internet and...
    Divya Sharma, Ruchi Kawatra in ICT Analysis and Applications
    Conference paper 2023
  17. Secure and Energy-Efficient IoT Systems Using SZ 1.4 and ChaCha12-Poly1305

    Internet of things (IoT) has emerged as one of the most notable technological advancements in the present era’s computing industry. It has enabled...
    Sanjay Patidar, Abhinav Panwar, Aditya Garg in Soft Computing and Signal Processing
    Conference paper 2021
  18. Enhancement the ChaCha20 Encryption Algorithm Based on Chaotic Maps

    As a result of the increasing demand for lightweight applications, the researchers set out to implement appropriate security mechanisms, one of which...
    Hussain H. Alyas, Alharith A. Abdullah in Next Generation of Internet of Things
    Conference paper 2021
  19. Cryptographic Hashes

    Cryptographic hashes are essential for cybersecurity. Cryptographic hashes are utilized for wide range of applications including password storage and...
    Chuck Easttom in Modern Cryptography
    Chapter 2022
  20. Post-quantum Digital Signature Scheme for Personal Data Security in Communication Network Systems

    The reliable collection, processing and storage of the sensitive personal data constitute an important research topic in the European context,...
    Maksim Iavich, Giorgi Iashvili, ... Sergiy Gnatyuk in Advances in Artificial Systems for Medicine and Education IV
    Conference paper 2021
Did you find what you were looking for? Share feedback.