Open hardware: A role to play in wireless sensor networks?

R Fisher, L Ledwaba, G Hancke, C Kruger - Sensors, 2015 - mdpi.com
The concept of the Internet of Things is rapidly becoming a reality, with many applications
being deployed within industrial and consumer sectors. At the 'thing'level—devices and inter …

Cryptkeeper: Improving security with encrypted RAM

PAH Peterson - … on Technologies for Homeland Security (HST), 2010 - ieeexplore.ieee.org
Random Access Memory (RAM) was recently shown to be vulnerable to physical attacks
exposing the totality of memory, including user data and encryption keys. We present …

Comparative analysis of cryptography library in IoT

U Kumar, T Borgohain, S Sanyal - arxiv preprint arxiv:1504.04306, 2015 - arxiv.org
The paper aims to do a survey along with a comparative analysis of the various
cryptography libraries that are applicable in the field of Internet of Things (IoT). The first half …

Performance measurement of encryption algorithms and their effect on real running in PLC networks

M Halas, I Bestak, M Orgon… - 2012 35th International …, 2012 - ieeexplore.ieee.org
Performance measurement of encryption algorithms and their effect on real running in PLC
networks Page 1 Abstract—This article and its outputs reveal the need of search for the …

Evaluation of cryptographic capabilities for the Android platform

D González, O Esparza, JL Muñoz, J Alins… - Future Network Systems …, 2015 - Springer
Future networks will be formed by millions of devices, many of them mobile, sharing
information and running applications. Android is currently the most widely used operating …

[PDF][PDF] Analysis of Cryptographic Libraries (SSL/TLS)

SP Kannojia, J Kurmi - International Journal of Computer Sciences …, 2021 - researchgate.net
Secure communication in Computer Network is very important which can be achieved by
Transport Layer Security (TLS) protocol. Various libraries have been created for the …

[書籍][B] Security trade-offs in Cloud storage systems

S Müller - 2017 - search.proquest.com
Securing software systems, is of paramount importance today. This is especially true for
cloud systems, as they can be attacked nearly anytime from everywhere over the Internet …

Service-Level Monitoring of HTTPS Traffic

WM Shbair - 2017 - theses.hal.science
In this thesis, we provide a privacy preserving for monitoring HTTPS services. First, we first
investigate a recent technique for HTTPS services monitoring that is based on the Server …

[PDF][PDF] Techniques for Establishing Trust in Modern Constrained Sensing Platforms with Trusted Execution Environments

C Shepherd - 2019 - researchgate.net
Abstract The Internet of Things (IoT)–the notion that interconnected everyday objects will
acquire the ability to monitor and act upon their environment–is anticipated to benefit …

[PDF][PDF] Investigating the performance of cryptographic primitives in Microsoft .NET and Bouncy Castle libraries

M Alrowaithy, N Thomas - researchgate.net
Security and performance are the two most important properties that decide the choice of the
cryptographic algorithms when designing a secure system. There is usually a trade-off …