Medical image encryption: a comprehensive review
In medical information systems, image data can be considered crucial information. As
imaging technology and methods for analyzing medical images advance, there will be a …
imaging technology and methods for analyzing medical images advance, there will be a …
Smartphone Security and Privacy: A Survey on APTs, Sensor-Based Attacks, Side-Channel Attacks, Google Play Attacks, and Defenses
There is an exponential rise in the use of smartphones in government and private institutions
due to business dependencies such as communication, virtual meetings, and access to …
due to business dependencies such as communication, virtual meetings, and access to …
Time-efficient finite field microarchitecture design for curve448 and ed448 on cortex-M4
The elliptic curve family of schemes has the lowest computational latency, memory use,
energy consumption, and bandwidth requirements, making it the most preferred public key …
energy consumption, and bandwidth requirements, making it the most preferred public key …
Security, privacy, and robustness for trustworthy AI systems: A review
MM Saeed, M Alsharidah - Computers and Electrical Engineering, 2024 - Elsevier
This review article provides a comprehensive exploration of the key pillars of trustworthy AI:
security privacy and robustness. The article delved into security measures both traditional …
security privacy and robustness. The article delved into security measures both traditional …
Attribute-based encryption schemes for next generation wireless IoT networks: a comprehensive survey
Most data nowadays are stored in the cloud; therefore, cloud computing and its extension—
fog computing—are the most in-demand services at the present time. Cloud and fog …
fog computing—are the most in-demand services at the present time. Cloud and fog …
Time-optimal design of finite field arithmetic for sike on cortex-m4
The advances in quantum technologies and the fast move toward quantum computing are
threatening classical cryptography and urge the deployment of post-quantum (PQ) schemes …
threatening classical cryptography and urge the deployment of post-quantum (PQ) schemes …
Efficient and side-channel resistant design of high-security Ed448 on ARM Cortex-M4
The demand for classical cryptography schemes continues to increase due to the exhaustive
studies on their security. Thus, constant improvement of timing, power consumption, and …
studies on their security. Thus, constant improvement of timing, power consumption, and …
Review of Physical Layer Security in 5G Wireless Networks
J Boodai, A Alqahtani, M Frikha - Applied Sciences, 2023 - mdpi.com
Fifth generation (5G) wireless networks promise to revolutionize the way we communicate
and connect to the internet. However, as with any new technology, 5G networks also bring …
and connect to the internet. However, as with any new technology, 5G networks also bring …
Side-channel analysis and countermeasure design for implementation of Curve448 on cortex-M4
The highly secure Curve448 cryptographic algorithm has been recently recommended by
NIST. While this algorithm provides 224-bit security over elliptic curve cryptography, its …
NIST. While this algorithm provides 224-bit security over elliptic curve cryptography, its …
[HTML][HTML] A machine learning-based assessment model for defect diagnosis in XLPE power cables
Cross-linked polyethylene (XLPE) power cables are commonly used in flexible DC
transmission applications. The diagnosis of the defects of XLPE power cable has …
transmission applications. The diagnosis of the defects of XLPE power cable has …