Open hardware: A role to play in wireless sensor networks?
The concept of the Internet of Things is rapidly becoming a reality, with many applications
being deployed within industrial and consumer sectors. At the 'thing'level—devices and inter …
being deployed within industrial and consumer sectors. At the 'thing'level—devices and inter …
Cryptkeeper: Improving security with encrypted RAM
PAH Peterson - … on Technologies for Homeland Security (HST), 2010 - ieeexplore.ieee.org
Random Access Memory (RAM) was recently shown to be vulnerable to physical attacks
exposing the totality of memory, including user data and encryption keys. We present …
exposing the totality of memory, including user data and encryption keys. We present …
Comparative analysis of cryptography library in IoT
The paper aims to do a survey along with a comparative analysis of the various
cryptography libraries that are applicable in the field of Internet of Things (IoT). The first half …
cryptography libraries that are applicable in the field of Internet of Things (IoT). The first half …
Performance measurement of encryption algorithms and their effect on real running in PLC networks
Performance measurement of encryption algorithms and their effect on real running in PLC
networks Page 1 Abstract—This article and its outputs reveal the need of search for the …
networks Page 1 Abstract—This article and its outputs reveal the need of search for the …
Evaluation of cryptographic capabilities for the Android platform
Future networks will be formed by millions of devices, many of them mobile, sharing
information and running applications. Android is currently the most widely used operating …
information and running applications. Android is currently the most widely used operating …
[PDF][PDF] Analysis of Cryptographic Libraries (SSL/TLS)
SP Kannojia, J Kurmi - International Journal of Computer Sciences …, 2021 - researchgate.net
Secure communication in Computer Network is very important which can be achieved by
Transport Layer Security (TLS) protocol. Various libraries have been created for the …
Transport Layer Security (TLS) protocol. Various libraries have been created for the …
[書籍][B] Security trade-offs in Cloud storage systems
S Müller - 2017 - search.proquest.com
Securing software systems, is of paramount importance today. This is especially true for
cloud systems, as they can be attacked nearly anytime from everywhere over the Internet …
cloud systems, as they can be attacked nearly anytime from everywhere over the Internet …
Service-Level Monitoring of HTTPS Traffic
WM Shbair - 2017 - theses.hal.science
In this thesis, we provide a privacy preserving for monitoring HTTPS services. First, we first
investigate a recent technique for HTTPS services monitoring that is based on the Server …
investigate a recent technique for HTTPS services monitoring that is based on the Server …
[PDF][PDF] Techniques for Establishing Trust in Modern Constrained Sensing Platforms with Trusted Execution Environments
C Shepherd - 2019 - researchgate.net
Abstract The Internet of Things (IoT)–the notion that interconnected everyday objects will
acquire the ability to monitor and act upon their environment–is anticipated to benefit …
acquire the ability to monitor and act upon their environment–is anticipated to benefit …
[PDF][PDF] Investigating the performance of cryptographic primitives in Microsoft .NET and Bouncy Castle libraries
M Alrowaithy, N Thomas - researchgate.net
Security and performance are the two most important properties that decide the choice of the
cryptographic algorithms when designing a secure system. There is usually a trade-off …
cryptographic algorithms when designing a secure system. There is usually a trade-off …