We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 1-20 of 1,886 results
  1. Performance Evaluation of Lightweight ASCON-HASH Algorithm for IoT Devices

    Lightweight cryptographic hashing algorithms are designed to be efficient and fast, making them suitable for use in resource-constrained milieus such...
    Rahul P. Neve, Rajesh Bansode in Intelligent Computing and Networking
    Conference paper 2023
  2. Comparison Study of Lightweight Hash Functions for an Authentication Solution on IoT

    Nowadays, a gigantic number of constrained devices are connected to the internet. The devices interact with each other through the wireless sensor...
    Conference paper 2022
  3. Recent Lightweight cryptography (LWC) based security advances for resource-constrained IoT networks

    In today's world, the Internet of Things (IoT) plays a major role to interconnect all the devices and improve the overall Quality of Life (QoL) for...

    Shraiyash Pandey, Bharat Bhushan in Wireless Networks
    Article 25 March 2024
  4. Lightweight and privacy-preserving device-to-device authentication to enable secure transitive communication in IoT-based smart healthcare systems

    Internet of Things (IoT) devices are often directly authenticated by the gateways within the network. In complex and large systems, IoT devices may...

    Sangjukta Das, Maheshwari Prasad Singh, Suyel Namasudra in Journal of Ambient Intelligence and Humanized Computing
    Article 21 June 2024
  5. A lightweight and anonymous mutual authentication and key agreement scheme for WBAN

    In the medical field, a wearable body area network is a wireless network in which wearable sensors are implemented in or on patients' bodies to...

    Saba Marandi, Farokhlagha Moazami, Amir Malekinezhad in Peer-to-Peer Networking and Applications
    Article 23 May 2024
  6. A Lightweight Two-Factor Continuous Authentication Protocol for Agricultural IoT Devices

    The rapid development of Internet of Things (IoT) technology has led to increased attention to its potential applications in agriculture. IoT-based...

    Tao Wan, **g**g Ge, ... Haixia Zhao in Wireless Personal Communications
    Article 01 May 2024
  7. A Novel Hash Function Based on Hybrid Cellular Automata and Sponge Functions

    John, Anita Reji, Alan Manoj, Ajay P Premachandran, Atul Zachariah, Basil Jose, JimmyHash functions serve as the fingerprint of a message. They also...
    Conference paper 2022
  8. Secured Data Sharing Method for Wireless Communication Network Based on Digital Twin and Merkle Hash Tree

    Data protection shares sensitive data with authorized users over a wireless communication network (WCN). To protect the data, a secured sharing...

    Ding Chen, Abeer Aljohani in Mobile Networks and Applications
    Article 11 June 2024
  9. Enhancement of Lightweight Secure Blockchain Based Edward-El Gamal in the Internet of Things (IoT)

    The Internet of Things (IoT) refers to the vast network of interconnected devices that collect, exchange, and analyze data, enabling automation and...

    R. Anusha, R. Saravanan in Wireless Personal Communications
    Article 01 February 2024
  10. A Lightweight Hash Function for Cryptographic and Pseudo-Cryptographic Applications

    In this paper, we design a lightweight hash function suitable for fast applications. The proposed hash function is intended to be used as a secondary...
    Imad El Hanouti, Hakim El Fadili, ... Abdellatif Jarjar in WITS 2020
    Conference paper 2022
  11. Implementation of Photon Hash Function on FPGA

    Every day, a large amount of data is transmitted through the Internet. It is essential that a message be sent to the recipient directly from the...
    W. Heera, K. Bhagyashree, ... Shraddha Hiremath in Advances in Signal Processing, Embedded Systems and IoT
    Conference paper 2023
  12. Fuzzy logic and CPSO-optimized key management for secure communication in decentralized IoT networks: A lightweight solution

    The act of implementing specific measures to ensure the security of cryptographic keys within an organization is referred to as key management....

    J. Vellingiri, T.R. Vedhavathy, ... C. Bala Subramanian in Peer-to-Peer Networking and Applications
    Article 08 June 2024
  13. MeHLDT: A multielement hash lock data transfer mechanism for on-chain and off-chain

    The trusted interaction of on-chain and off-chain data is an important foundation for large-scale applications of blockchain systems. When the...

    Bei Yu, Libo Feng, ... Shaowen Yao in Peer-to-Peer Networking and Applications
    Article 14 June 2023
  14. Simple, secure and lightweight authentication protocol with session-key generation for IIoT device in IIoT networks

    Device authentication is essential for protecting IIoT networks due to the industrial internet of things (IIoT) rise in connected devices. This work...

    Usha Jain, Aprna Tripathi, ... Gireesh Kumar in Microsystem Technologies
    Article 05 December 2023
  15. Lightweight Secure and Scalable Scheme for Data Transmission in the Internet of Things

    The Internet of Things (IoT) is rapidly permeating critical domains, enabling the interconnection and utilization of diverse devices on a large scale...

    Ibraheem Al-Hejri, Farag Azzedin, ... Mohamed Eltoweissy in Arabian Journal for Science and Engineering
    Article 22 March 2024
  16. Comparative Study of Keccak and Blake2 Hash Functions

    Hashing is so crucial for integrity. Indeed, in order to respond to new technologies requirements, hash functions have always been subject to...
    Hind EL Makhtoum, Youssef Bentaleb in Networking, Intelligent Systems and Security
    Conference paper 2022
  17. A Comparison of Lightweight Cryptographic Algorithms

    Most IoT devices or WSN devices have limitations on memory, power, and energy consumption. Therefore, it is impossible to implement traditional...
    Conference paper 2024
  18. Nature-Inspired Lightweight Cryptosystems

    Examining nature-inspired lightweight cryptosystems, this chapter discusses their emulation of natural processes for efficient and lightweight...
    Shishir Kumar Shandilya, Agni Datta, Atulya K. Nagar in A Nature-Inspired Approach to Cryptology
    Chapter 2023
  19. Implicit Lightweight Proxy Based Key Agreement for the Internet of Things (ILPKA)

    Due to the heterogeneity of devices available in the Internet of Things and the limitations of the resources connected to it, simplifying and...

    Rasoul Roustaei, Hamid Haj Seyyed Javadi, Midia Reshadi in Wireless Personal Communications
    Article 03 April 2023
  20. Merkle hash tree improved strongly constrained discrete hashing function-based authentication scheme for enabling security for smart home IoT applications

    In the modern era, smart home technology is considered as the most growing application of Internet of Things (IoT) as they facilitate users for...

    K. Swapna Sudha, N. Jeyanthi in Peer-to-Peer Networking and Applications
    Article 05 August 2023
Did you find what you were looking for? Share feedback.