A new private information encryption method in internet of things under cloud computing environment

H Ma, Z Zhang - Wireless Communications and Mobile …, 2020 - Wiley Online Library
The existence of Internet of Things (IoT) facilitates the collection and transmission of urban
data information. However, it can leak users' personal privacy information in smart cities …

[LIBRO][B] Perfect Secrecy in IoT: A Hybrid Combinatorial-Boolean Approach

B Zolfaghari, K Bibak - 2022 - books.google.com
Perfectly-secure cryptography is a branch of information-theoretic cryptography. A perfectly-
secure cryptosystem guarantees that the malicious third party cannot guess anything …

Information-Theoretic Cryptography: A Maneuver in the Trade-Off Space of Cryptography in IoT

B Zolfaghari, K Bibak - Perfect Secrecy in IoT: A Hybrid Combinatorial …, 2022 - Springer
This chapter discusses the reason why we have chosen to study perfectly secure
cryptography (as a branch of information-theoretic cryptography) among the existing …

[PDF][PDF] SIMULATION OF A SECURE APPROACH OF DATA COMMUNICATION ON PEER TO PEER NETWORK USING BLOCKHAIN TECHNOLOGY ON ETHEREUM

MR Naaz, A Kumar - SIMULATION, 2023 - researchgate.net
Blockchain technology is now widely acceptable among emerging technology, with its
evolution in the past three years and acceptability of it among various industries and …

Perfect Secrecy in IoT

B Zolfaghari, K Bibak - Springer
Perfectly secure cryptography is a branch of information-theoretic cryptography. A perfectly
secure cryptosystem guarantees that the malicious third party cannot guess anything …

[CITAZIONE][C] Recent Trends and Challenges in Fog/Edge Computing for Internet of Things

R Yadav