Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Lightweight cryptography methods
While our conventional cryptography methods, such for AES (encryption), SHA-256
(hashing) and RSA/Elliptic Curve (signing), work well on systems which have reasonable …
(hashing) and RSA/Elliptic Curve (signing), work well on systems which have reasonable …
A review of security in internet of things
Abstract Internet of Things (IoT) has drawn significant attention in recent years since it has
made revolutionary changes in human life. The IoT enables the exchange of information in a …
made revolutionary changes in human life. The IoT enables the exchange of information in a …
[HTML][HTML] A novel chaos-based permutation for image encryption
M Alawida - Journal of King Saud University-Computer and …, 2023 - Elsevier
Image encryption is an essential method for ensuring confidentiality during transmission on
open channels. Digital images have a high correlation with large redundant data, requiring …
open channels. Digital images have a high correlation with large redundant data, requiring …
Advanced lightweight encryption algorithms for IoT devices: survey, challenges and solutions
There are many emerging areas in which highly constrained devices are interconnected and
communicated to accomplish some tasks. Nowadays, Internet of Things (IoT) enables many …
communicated to accomplish some tasks. Nowadays, Internet of Things (IoT) enables many …
[PDF][PDF] Report on lightweight cryptography
K McKay, L Bassham, M Sönmez Turan, N Mouha - 2016 - csrc.nist.gov
NIST-approved cryptographic standards were designed to perform well using general-
purpose computers. In recent years, there has been increased deployment of small …
purpose computers. In recent years, there has been increased deployment of small …
SLIM: A lightweight block cipher for internet of health things
Nowadays, there is a strong demand for increasing the protection of resource-constrained
devices such as Radio frequency identification (RFID) systems. Current cryptographic …
devices such as Radio frequency identification (RFID) systems. Current cryptographic …
Lightweight cryptographic hash functions: Design trends, comparative study, and future directions
The emergence of the Internet of Things (IoT) has enabled billions of devices that collect
large amounts of data to be connected. Therefore, IoT security has fundamental …
large amounts of data to be connected. Therefore, IoT security has fundamental …
The DAG blockchain: A secure edge assisted honeypot for attack detection and multi-controller based load balancing in SDN 5G
Software-defined networking (SDN) has increased the need for security due to the
participation of illegitimate packets resulting from poor processing times and inadequate …
participation of illegitimate packets resulting from poor processing times and inadequate …
Recent reinforcement learning and blockchain based security solutions for internet of things: Survey
Users' security is one of the most important issues in Internet of Things (IoT) due to the high
number of IoT devices involved in different applications. Security threats are evolving at a …
number of IoT devices involved in different applications. Security threats are evolving at a …
[HTML][HTML] Implementing zero trust security with dual fuzzy methodology for trust-aware authentication and task offloading in multi-access edge computing
This paper proposes an efficient trust-aware authentication and task offloading scheme for
Multi-Access Edge Computing (MEC) using the Zero Trust Security (ZTS) principles. The …
Multi-Access Edge Computing (MEC) using the Zero Trust Security (ZTS) principles. The …