An analysis of lightweight cryptographic algorithms for IoT-Applications
With the arrival of advanced technologies, IoT has enabled the connection of many devices
that can collect huge amounts of data. IoT security requirements are therefore supreme …
that can collect huge amounts of data. IoT security requirements are therefore supreme …
Security Attacks And Countermeasures In Smart Homes
Abstract The Internet of Things (IoT) application is visible in all aspects of humans' day-to-
day affairs. The demand for IoT is growing at an unprecedented rate, from wearable …
day affairs. The demand for IoT is growing at an unprecedented rate, from wearable …
A New Security Mechanism for IoT Devices: Electroencephalogram (EEG) Signals
The variety and high usage rate of Internet of Things (IoT) devices make them a prime target
for cyber-attacks. Unfortunately, the limited physical size of IoT devices prevents the use of …
for cyber-attacks. Unfortunately, the limited physical size of IoT devices prevents the use of …
Development of Lightweight and Cheaper 5G Mobile Communication System to Analyze the Performance of Espresso Ciphers and Grain
C Kamalanathan, J Balamurugan… - … , Security and Space …, 2025 - books.google.com
A significant difficulty in a resource-constrained setting is kee** an optimal sense of
balance among safety and other presentation parameters such as memorial need, energy …
balance among safety and other presentation parameters such as memorial need, energy …
Development of Lightweight and Cheaper 5G Mobile Communication System to Analyze the Performance of Espresso Ciphers and Grain Family
C Kamalanathan, J Balamurugan, N Sharma… - … Conference on Cyber …, 2024 - Springer
A significant difficulty in a resource-constrained setting is kee** an optimal sense of
balance among safety and other presentation parameters such as memorial need, energy …
balance among safety and other presentation parameters such as memorial need, energy …
Light-Weight Cryptography Technique for Secure Healthcare Wearable IoT Device Data
AR Patel, JA Chauhan - Advancing Cyber Security Through …, 2025 - igi-global.com
With billions of devices expected to be connected, the Internet of Things (IoT) is a technology
with great potential. However, this increased connectivity also brings concerns about the …
with great potential. However, this increased connectivity also brings concerns about the …
[PDF][PDF] LWC: EFFICIENT LIGHTWEIGHT BLOCK CIPHERS FOR PROVIDING SECURITY TO CONSTRAINED DEVICES A SOLUTION FOR IOT DEVICES
A ABDUL, G NARAYANA, RS KISHORE… - Journal of Theoretical …, 2023 - jatit.org
Internet of things (IoT) is the infrastructure of global network for the information to the nation
for societal use and enabling smart services by interconnecting virtual and physical devices …
for societal use and enabling smart services by interconnecting virtual and physical devices …
Check for updates
W AlAqqad¹, M Nijim, U Onyeakazi… - Proceedings of the …, 2024 - books.google.com
Edge computing, an extension of cloud and IoT technologies, introduces unique challenges
for intrusion-detection systems (IDS). This study explores IDS architecture in the context of …
for intrusion-detection systems (IDS). This study explores IDS architecture in the context of …
Private Ethereum Blockchain Implementation and Its Security Features for Smart Home IoT
H Alam - 2023 - search.proquest.com
The security and privacy of IoT devices have become primary concerns as smart home
networks are connected to the internet. Ethereum blockchain can be a solution to mitigate or …
networks are connected to the internet. Ethereum blockchain can be a solution to mitigate or …
[PDF][PDF] Алгоритм нечіткого управління «розумним» будинком
МЮ Мірута - 2024 - dspace.wunu.edu.ua
Робота написана обсягом 104 сторінки і містить 24 ілюстрацій, 2 таблиць, 1 додаток та
49 джерел за переліком посилань. Метою роботи є розробка концепції та реалізація …
49 джерел за переліком посилань. Метою роботи є розробка концепції та реалізація …