Flexible temperature sensors
R Liu, L He, M Cao, Z Sun, R Zhu, Y Li - Frontiers in Chemistry, 2021 - frontiersin.org
Temperature reflects the balance between production and dissipate of heat. Flexible
temperature sensors are primary sensors used for temperature monitoring. To obtain real …
temperature sensors are primary sensors used for temperature monitoring. To obtain real …
A review on security implementations in soft-processors for IoT applications
With the increase in the number of devices connected to the Internet, the need to maintain
and harden information security in Internet systems has significantly increased. This has led …
and harden information security in Internet systems has significantly increased. This has led …
Area-Efficient Realization of Binary Elliptic Curve Point Multiplication Processor for Cryptographic Applications
This paper proposes a novel hardware design for a compact crypto processor devoted to
elliptic-curve point multiplication over GF (2 233). We focus on minimizing hardware usage …
elliptic-curve point multiplication over GF (2 233). We focus on minimizing hardware usage …
Hardware–software co-design framework for data encryption in image processing systems for the Internet of Things environment
Data protection is a severe constraint in the heterogeneous IoT era. This article presents a
hardware–software cosimulation of AES-128 bit encryption and decryption for IoT edge …
hardware–software cosimulation of AES-128 bit encryption and decryption for IoT edge …
A review on fpga implementation of lightweight cryptography for wireless sensor network
B Sreehari, V Sankar, RS Lopez… - 2023 International …, 2023 - ieeexplore.ieee.org
Wireless sensor networks (WSNs) have become increasingly popular in recent years due to
their ability to remotely monitor and gather data in a variety of applications. The frequent …
their ability to remotely monitor and gather data in a variety of applications. The frequent …
Hardware Software Co-Simulation of an AES-128 based data encryption in image processing systems for the internet of things environment
Security of the data is a major challenge in the deployment and management of the Internet
of Things (IoT) systems in the heterogeneous environment, where data gets transferred very …
of Things (IoT) systems in the heterogeneous environment, where data gets transferred very …
SINT: Toward a Blockchain-Based Secure In-Band Network Telemetry Architecture
The foundation of network management is to timely, accurately, and flexibly monitor the
status of a managed network. Recently, In-band Network Telemetry (INT) has presented its …
status of a managed network. Recently, In-band Network Telemetry (INT) has presented its …
Performance Analysis of Enhanced AES-128 and Blowfish Algorithms Through Parallel-Pipelined-Memory Techniques
Currently, the advanced encryption standard (AES)-128 algorithm is deployed by the
Institute of Electrical and Electronics Engineers standards, and it is widely used to secure …
Institute of Electrical and Electronics Engineers standards, and it is widely used to secure …
An Optimized Flexible Accelerator for Elliptic Curve Point Multiplication over NIST Binary Fields
This article proposes a flexible hardware accelerator optimized from a throughput and area
point of view for the computationally intensive part of elliptic curve cryptography. The target …
point of view for the computationally intensive part of elliptic curve cryptography. The target …
Power Optimization in Wireless Sensor Network Using VLSI Technique on FPGA Platform
S Leelakrishnan, A Chakrapani - Neural Processing Letters, 2024 - Springer
Nowadays, the demand for high-performance wireless sensor networks (WSN) is increasing,
and its power requirement has threatened the survival of WSN. The routing methods cannot …
and its power requirement has threatened the survival of WSN. The routing methods cannot …