Beyond Basic Trust: Envisioning the Future of NextGen Networked Systems and Digital Signatures
Authentication and integrity are foundational security services for trustworthy systems and
the prerequisite of privacy preservation. At the heart of these services lies digital signatures …
the prerequisite of privacy preservation. At the heart of these services lies digital signatures …
Energy-aware digital signatures for embedded medical devices
Authentication is vital for the Internet of Things (IoT) applications involving sensitive data (eg,
medical and financial systems). Digital signatures offer scalable authentication with non …
medical and financial systems). Digital signatures offer scalable authentication with non …
Lightweight and Resilient Signatures for Cloud-Assisted Embedded IoT Systems
Digital signatures provide scalable authentication with non-repudiation and are vital tools for
the Internet of Things (IoT). Many IoT applications harbor vast quantities of resource-limited …
the Internet of Things (IoT). Many IoT applications harbor vast quantities of resource-limited …
Proof-of-useful-randomness: Mitigating the energy waste in blockchain proof-of-work
Proof-of-Work (PoW) is one of the fundamental and widely-used consensus algorithms in
blockchains. In PoW, nodes compete to receive the mining reward by trying to be the first to …
blockchains. In PoW, nodes compete to receive the mining reward by trying to be the first to …
Compatible certificateless and identity-based cryptosystems for heterogeneous iot
Certificates ensure the authenticity of users' public keys, however their overhead (eg,
certificate chains) might be too costly for some IoT systems like aerial drones. Certificate-free …
certificate chains) might be too costly for some IoT systems like aerial drones. Certificate-free …
Efficient identity-based and certificateless cryptosystems
Disclosed are various embodiments for certificate-free cryptosystems that achieve significant
computational and communication efficiency as compared to prior systems. A private key …
computational and communication efficiency as compared to prior systems. A private key …
[PDF][PDF] Lightweight and Scalable Post-Quantum Authentication for Medical Internet of Things
ABSTRACT The Medical Internet of Things (MIoT) harbors resource-limited medical
embedded devices that collect security-sensitive data from users for analysis, monitoring …
embedded devices that collect security-sensitive data from users for analysis, monitoring …
An Embedded RISC-V Core with Fast Modular Multiplication
ÖF Irmak, A Yurdakul - arxiv preprint arxiv:2009.14685, 2020 - arxiv.org
One of the biggest concerns in IoT is privacy and security. Encryption and authentication
need big power budgets, which battery-operated IoT end-nodes do not have. Hardware …
need big power budgets, which battery-operated IoT end-nodes do not have. Hardware …
Метод криптографічного захисту протоколів в засобах комунікації інтернету речей
МП Лаптєв - 2024 - elar.khmnu.edu.ua
Анотація У вступі подано об'єкт та предмет дослідження, мету, наукову новизну та
практичну цінність роботи, а також характеристику структури роботи. У першому …
практичну цінність роботи, а також характеристику структури роботи. У першому …
Compatible Certificateless and Identity-Based Cryptosystems for Heterogeneous IoT
TH Yuen - … Security: 23rd International Conference, ISC 2020 …, 2020 - books.google.com
Certificates ensure the authenticity of users' public keys, however their overhead (eg,
certificate chains) might be too costly for some IoT systems like aerial drones. Certificate-free …
certificate chains) might be too costly for some IoT systems like aerial drones. Certificate-free …