Precision health data: Requirements, challenges and existing techniques for data security and privacy

C Thapa, S Camtepe - Computers in biology and medicine, 2021 - Elsevier
Precision health leverages information from various sources, including omics, lifestyle,
environment, social media, medical records, and medical insurance claims to enable …

A survey on lightweight block ciphers for low-resource devices: Comparative study and open issues

BJ Mohd, T Hayajneh, AV Vasilakos - Journal of Network and Computer …, 2015 - Elsevier
This paper investigates the lightweight block ciphers׳ implementations, which have received
a fair amount of research for their essential security role in low-resource devices. Our …

Advanced lightweight encryption algorithms for IoT devices: survey, challenges and solutions

S Singh, PK Sharma, SY Moon, JH Park - Journal of Ambient Intelligence …, 2024 - Springer
There are many emerging areas in which highly constrained devices are interconnected and
communicated to accomplish some tasks. Nowadays, Internet of Things (IoT) enables many …

An inside job: Remote power analysis attacks on FPGAs

F Schellenberg, DRE Gnad, A Moradi… - IEEE Design & …, 2021 - ieeexplore.ieee.org
This article presents how programmable resources of an FPGA can be utilized to perform
side-channel attacks and reports practical examples of these attacks.-Rosario Cammarota …

The key is left under the mat: On the inappropriate security assumption of logic locking schemes

MT Rahman, S Tajik, MS Rahman… - … Security and Trust …, 2020 - ieeexplore.ieee.org
Logic locking has been proposed as an obfuscation technique to protect outsourced IC
designs from IP piracy by untrusted entities in the design and fabrication process. In this …

Hardware security for Internet of Things identity assurance

A Cirne, PR Sousa, JS Resende… - … Surveys & Tutorials, 2024 - ieeexplore.ieee.org
With the proliferation of Internet of Things (IoT) devices, there is an increasing need to
prioritize their security, especially in the context of identity and authentication mechanisms …

CUDA leaks: a detailed hack for CUDA and a (partial) fix

RD Pietro, F Lombardi, A Villani - ACM Transactions on Embedded …, 2016 - dl.acm.org
Graphics processing units (GPUs) are increasingly common on desktops, servers, and
embedded platforms. In this article, we report on new security issues related to CUDA, which …

Lightweight cryptography algorithms for internet of things enabled networks: An overview

LM Shamala, G Zayaraz, K Vivekanandan… - Journal of Physics …, 2021 - iopscience.iop.org
Internet of Things is a worldwide set-up of interconnected entities that permits millions of
devices to communicate with each other. Combined with reliable communication, ensuring …

Training support vector machines with privacy-protected data

FJ González-Serrano, Á Navia-Vázquez… - Pattern Recognition, 2017 - Elsevier
In this paper, we address a machine learning task using encrypted training data. Our basic
scenario has three parties: Data Owners, who own private data; an Application, which wants …

Modeling and optimization of the lightweight HIGHT block cipher design with FPGA implementation

BJ Mohd, T Hayajneh, ZA Khalaf… - Security and …, 2016 - Wiley Online Library
The growth of low‐resource devices has increased rapidly in recent years. Communication
in such devices presents two challenges: security and resource limitation. Lightweight …