On perspective of security and privacy-preserving solutions in the internet of things
Abstract The Internet of Things (IoT) brings together a large variety of devices of different
platforms, computational capacities and functionalities. The network heterogeneity and the …
platforms, computational capacities and functionalities. The network heterogeneity and the …
Design of a secure password-based authentication scheme for M2M networks in IoT enabled cyber-physical systems
KM Renuka, S Kumari, D Zhao, L Li - IEEE Access, 2019 - ieeexplore.ieee.org
The Internet of Things (IoT) forms a foundation for cyber-physical systems. We propose an
efficient and secure authentication scheme for machine-to-machine (M2M) networks in IoT …
efficient and secure authentication scheme for machine-to-machine (M2M) networks in IoT …
Optimization of power analysis using neural network
In power analysis, many different statistical methods and power consumption models are
used to obtain the value of a secret key from the power traces measured. An interesting …
used to obtain the value of a secret key from the power traces measured. An interesting …
An Authentication Protocol for the Medical Internet of Things
The progress in biomedical sensors, Internet of Things technologies, big data, cloud
computing, and artificial intelligence is leading the development of e-health medical …
computing, and artificial intelligence is leading the development of e-health medical …
Performance analysis and comparison of different elliptic curves on smart cards
Elliptic curves are very often used in the cryptographic protocol design due to their memory
efficiency and useful features, such as the bilinear pairing support. However, in many …
efficiency and useful features, such as the bilinear pairing support. However, in many …
[PDF][PDF] JCAlgTest: Robust Identification Metadata for Certified Smartcards.
P Svenda, R Kvasnovský, I Nagy, A Dufka - SECRYPT, 2022 - pdfs.semanticscholar.org
The certification of cryptographic smartcards under the Common Criteria or NIST FIPS140-2
is a wellestablished process, during which an evaluation facility validates the manufacturer's …
is a wellestablished process, during which an evaluation facility validates the manufacturer's …
Attribute‐based credentials with cryptographic collusion prevention
Cryptographic attribute‐based credentials (ABCs) allow users to prove their personal
attributes remotely and in a privacy‐friendly way. While staying anonymous and …
attributes remotely and in a privacy‐friendly way. While staying anonymous and …
Assessment of cryptography support and security on programmable smart cards
Nowadays, smart cards are widely used as authentication items in identification systems and
access control systems. Moreover, the smart cards may serve as cryptographic modules and …
access control systems. Moreover, the smart cards may serve as cryptographic modules and …
Performance analysis of pairing-based elliptic curve cryptography on constrained devices
The paper deals with the implementation aspects of the bilinear pairing operation over an
elliptic curve on constrained devices, such as smart cards, embedded devices, smart meters …
elliptic curve on constrained devices, such as smart cards, embedded devices, smart meters …
Cryptographic protocols for confidentiality, authenticity and privacy on constrained devices
Cyber security and privacy protection play a crucial role in modern communication systems.
While it is relatively easy to secure classical networks, it is a hard problem to provide even …
While it is relatively easy to secure classical networks, it is a hard problem to provide even …