Gotowa bibliografia na temat „Light weight cryptography”

Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych

Wybierz rodzaj źródła:

Zobacz listy aktualnych artykułów, książek, rozpraw, streszczeń i innych źródeł naukowych na temat „Light weight cryptography”.

Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.

Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.

Artykuły w czasopismach na temat "Light weight cryptography"

1

Alshar’e, Marwan, Sharf Alzu’bi, Ahed Al-Haraizah, Hamzah Ali Alkhazaleh, Malik Jawarneh, and Mohammad Rustom Al Nasar. "Elliptic curve cryptography based light weight technique for information security." Bulletin of Electrical Engineering and Informatics 14, no. 3 (2025): 2300–2308. https://doi.org/10.11591/eei.v14i3.8587.

Pełny tekst źródła
Streszczenie:
Recent breakthroughs in cryptographic technology are being thoroughly scrutinized due to their emphasis on innovative approaches to design, implementation, and attacks. Lightweight cryptography (LWC) is a technological advancement that utilizes a cryptographic algorithm capable of being adjusted to function effectively in various constrained environments. This study provides an in-depth analysis of elliptic curve cryptography (ECC), which is a type of asymmetric cryptographic method known as LWC. This cryptographic approach operates over elliptic curves and has two applications: key exchange a
Style APA, Harvard, Vancouver, ISO itp.
2

Abd Zaid, Mustafa, and Soukaena Hassan. "Proposal Framework to Light Weight Cryptography Primitives." Engineering and Technology Journal 40, no. 4 (2022): 516–26. http://dx.doi.org/10.30684/etj.v40i4.1679.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
3

Ahmed, Mubbashir. "Lightweight Cryptographic Algorithm Development Using Fundamental Cryptographic Techniques." VFAST Transactions on Software Engineering 13, no. 1 (2025): 178–92. https://doi.org/10.21015/vtse.v13i1.2050.

Pełny tekst źródła
Streszczenie:
Cryptography is used to make data and information transmission and computational systems secure over the networks by using mathematical and scientific techniques. The cryptographic algorithm should fulfil the conditions of authentication, confidentiality, integrity and reliability. In today’s era, where digital communication and data storage is increasing day by day and the data leakage, breaches and attacks are continuously rising. The increase in need of strong and secure cryptography algorithms to protect user information that ensures the integrity and confidentiality of data. The existing
Style APA, Harvard, Vancouver, ISO itp.
4

Alkhudaydi, Malak G., and Adnan A. Gutub. "Integrating Light-Weight Cryptography with Diacritics Arabic Text Steganography Improved for Practical Security Applications." Journal of Information Security and Cybercrimes Research 3, no. 1 (2020): 13–30. http://dx.doi.org/10.26735/fmit1649.

Pełny tekst źródła
Streszczenie:
Cryptography and steganography are combined to provide practical data security. This paper proposes integrating light-weight cryptography with improved Arabic text steganography for optimizing security applications. It uses light-weight cryptography to cope with current limited device capabilities, to provide acceptable required security. The work tests hiding encrypted secret information within Arabic stego-cover texts, using all common diacritics found naturally in the Arabic language. The study considers different challenging situations and scenarios in order to evaluate security practicali
Style APA, Harvard, Vancouver, ISO itp.
5

Raja, M., Dr S. Dhanasekaran, and Dr V. Vasudevan. "Light Weight Cryptography based Medical Data and Image Encryption Scheme." Webology 18, no. 2 (2021): 88–104. http://dx.doi.org/10.14704/web/v18i2/web18309.

Pełny tekst źródła
Streszczenie:
Many medical companies use cloud technology to collect, distribute and transmit medical records. Given the need for medical information, confidentiality is a key issue. In this study, we propose an encrypted scheme based on encrypted data for an electronic healthcare environment. We use hybrid Attribute based encryption and Triple DES encryption technique (ABETDES) scheme, including identity-based cryptography (IBC), to ensure data privacy through communication channels և to improve the reliability of cloud computing. There are also limited indicators of light processing and storage resources.
Style APA, Harvard, Vancouver, ISO itp.
6

Sangari, S., and Martin Leo Manickam. "A LIGHT-WEIGHT CRYPTOGRAPHY ANALYSIS FOR WIRELESS BASED HEALTHCARE APPLICATIONS." Journal of Computer Science 10, no. 10 (2014): 2088–94. http://dx.doi.org/10.3844/jcssp.2014.2088.2094.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
7

B, Akhil, Muzammil Shareef Md, Shalini B, Fairooz SK, and Shaik Mohammed Rafi. "Light weight security coding using PRESENT algorithm for cryptography application." International Journal of VLSI and Signal Processing 7, no. 2 (2020): 1–5. http://dx.doi.org/10.14445/23942584/ijvsp-v7i2p101.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
8

Yalamanchili, Anjani, D. Venkatasekhar, and G. Vijay Kumar. "Iot Based Alzheimer’s Disease Diagnosis Model for Providing Security Using Light Weight Hybrid Cryptography." International Journal on Recent and Innovation Trends in Computing and Communication 11, no. 4 (2023): 148–59. http://dx.doi.org/10.17762/ijritcc.v11i4.6398.

Pełny tekst źródła
Streszczenie:
Security in the Internet of things (IoT) is a broad yet active research area that focuses on securing the sensitive data being circulated in the network. The data involved in the IoT network comes from various organizations, hospitals, etc., that require a higher range of security from attacks and breaches. The common solution for security attacks is using traditional cryptographic algorithms that can protect the content through encryption and decryption operations. The existing solutions are suffering from major drawbacks, including computational complexities, time and space complexities, slo
Style APA, Harvard, Vancouver, ISO itp.
9

Alassaf, Norah, and Adnan Gutub. "Simulating Light-Weight-Cryptography Implementation for IoT Healthcare Data Security Applications." International Journal of E-Health and Medical Communications 10, no. 4 (2019): 1–15. http://dx.doi.org/10.4018/ijehmc.2019100101.

Pełny tekst źródła
Streszczenie:
Short period monitoring and emergency notification of healthcare signals is becoming affordable with existence of internet of things (IoT) support. However, IoT does not prevent challenges that may hinder the appropriate safe spread of medical solutions. Confidentiality of data is vital, making a real fear requesting cryptography. The limitations in memory, computations processing, power consumptions, and small-size devices contradict the robust encryption process asking for help of low-weight-cryptography to handle practically. This article presents a comparative analysis of performance evalu
Style APA, Harvard, Vancouver, ISO itp.
10

MS, Dhruva, Gururaj H L, and Ramesh B. "Cryptography Based Light-Weight Attribute Encryption Scheme for Internet of Things." International Journal of Engineering and Applied Computer Science 02, no. 05 (2017): 160–64. http://dx.doi.org/10.24032/ijeacs/0205/03.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
Więcej źródeł

Rozprawy doktorskie na temat "Light weight cryptography"

1

Reyes, Torres Oscar Mauricio [Verfasser]. "Neural Synchronization and Light-weight Cryptography in Embedded Systems / Oscar Mauricio Reyes Torres." Aachen : Shaker, 2012. http://d-nb.info/106773631X/34.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
2

Nimgaonkar, Satyajeet. "Secure and Energy Efficient Execution Frameworks Using Virtualization and Light-weight Cryptographic Components." Thesis, University of North Texas, 2014. https://digital.library.unt.edu/ark:/67531/metadc699986/.

Pełny tekst źródła
Streszczenie:
Security is a primary concern in this era of pervasive computing. Hardware based security mechanisms facilitate the construction of trustworthy secure systems; however, existing hardware security approaches require modifications to the micro-architecture of the processor and such changes are extremely time consuming and expensive to test and implement. Additionally, they incorporate cryptographic security mechanisms that are computationally intensive and account for excessive energy consumption, which significantly degrades the performance of the system. In this dissertation, I explore the dom
Style APA, Harvard, Vancouver, ISO itp.
3

Adekunle, Andrew A. "Design and analysis of light-weight symmetric cryptographic frameworks and constructs for secure packet mode wireless communication." Thesis, University of Greenwich, 2012. http://gala.gre.ac.uk/9806/.

Pełny tekst źródła
Streszczenie:
This thesis reports research undertaken to address the deficiencies that existing standardised cryptographic constructs exhibit when securing packet mode wireless communication in WSN. The aim of the research is to devise innovative cryptographic frameworks, which will facilitate design and implementation of light-weight symmetric cryptographic modular constructs. Four cryptographic frameworks have been devised and block cipher based light-weight constructs using the frameworks have been designed and benchmarked against contemporary standard constructs. The constructs introduced in this disser
Style APA, Harvard, Vancouver, ISO itp.
4

Wang, Hsi-Wen, and 王錫文. "A study on positioning mechanism and light-weight cryptography on active RFID systems." Thesis, 2013. http://ndltd.ncl.edu.tw/handle/ab4fvr.

Pełny tekst źródła
Streszczenie:
博士<br>國立臺北科技大學<br>電腦與通訊研究所<br>101<br>This study includes two parts: one is to implement and experiment an indoor positioning system based on an active Radio Frequency Identification (RFID) system, and the other is an authentication protocol with light weight cryptography implemented in an active RFID system. The first part of this study is mainly to implement an active RFID system for an indoor positioning service. The indoor positioning system uses four reference tags for the reference addresses and a tracked object equipped with an active tag. Reference tags transmit the received signal stre
Style APA, Harvard, Vancouver, ISO itp.
5

Ming-KungSun and 孫明功. "Light-Weight Cryptographic Protocols and Applications." Thesis, 2013. http://ndltd.ncl.edu.tw/handle/13464593028480040489.

Pełny tekst źródła
Streszczenie:
博士<br>國立成功大學<br>電腦與通信工程研究所<br>101<br>The concept of PKI is a cornerstone of modern security solutions. Its usage permeates many different applications where digital signatures, secure communications, and identity management play primary or auxiliary roles. It can be applied as a helper technology which assist other frameworks by lending its inherent attributes. This dissertation details three distinct applications of PKI concepts in three very different fields. Their respective contributions vary greatly, but they all owe their realization to the concepts of PKI. First, in the area of Distrib
Style APA, Harvard, Vancouver, ISO itp.

Części książek na temat "Light weight cryptography"

1

Buchanan, William J. "Light-weight Cryptography and Other Methods." In Cryptography. River Publishers, 2022. http://dx.doi.org/10.1201/9781003337751-10.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
2

Abdelraheem, Mohamed Ahmed, Julia Borghoff, Erik Zenner, and Mathieu David. "Cryptanalysis of the Light-Weight Cipher A2U2." In Cryptography and Coding. Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-25516-8_23.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
3

Al Shebli, Hessa Mohammed Zaher, and Babak D. Beheshti. "Light Weight Cryptography for Resource Constrained IoT Devices." In Proceedings of the Future Technologies Conference (FTC) 2018. Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-030-02686-8_16.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
4

Jilna, Payingat, and P. P. Deepthi. "Light Weight Key Establishment Scheme for Wireless Sensor Networks." In Security, Privacy, and Applied Cryptography Engineering. Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-49445-6_7.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
5

Hamsha, K., and G. S. Nagaraja. "Threshold Cryptography Based Light Weight Key Management Technique for Hierarchical WSNs." In Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering. Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-20615-4_14.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
6

Dandin, Theodore Jesudas E., D. Krishnaveni, and K. Chandrasekhar. "Light Weight Cryptography and Its Application in Resource Constrained Environment Using Reversible Logic." In Proceedings of the 2nd International Conference on Recent Trends in Machine Learning, IoT, Smart Cities and Applications. Springer Singapore, 2022. http://dx.doi.org/10.1007/978-981-16-6407-6_43.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
7

Yadav, Sameer, Surepalli Venkataratnam, P. Balaji Srikaanth, Jetti Madhavi, A. Basi Reddy, and R. Senthamil Selvan. "Development of Light Weight Authentication Protocol Based on Cryptography to Access the IoT Device." In Communications in Computer and Information Science. Springer Nature Switzerland, 2024. http://dx.doi.org/10.1007/978-3-031-73494-6_11.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
8

Sridharan, Ravi, and Thangakumar Jeyaprakash. "Security for Data in IOT Using a New APS Elliptic Curve Light Weight Cryptography Algorithm." In Artificial Intelligence Techniques for Advanced Computing Applications. Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-15-5329-5_13.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
9

Shankar, K., and Mohamed Elhoseny. "An Optimal Light Weight Cryptography—SIMON Block Cipher for Secure Image Transmission in Wireless Sensor Networks." In Lecture Notes in Electrical Engineering. Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-20816-5_2.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
10

Sasikaladevi, N., N. Mahalakshmi, and N. Archana. "LEACH- Genus 2 Hyper Elliptic Curve Based Secured Light-Weight Visual Cryptography for Highly Sensitive Images." In Communications in Computer and Information Science. Springer Singapore, 2018. http://dx.doi.org/10.1007/978-981-13-1810-8_30.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.

Streszczenia konferencji na temat "Light weight cryptography"

1

Poojari, Asmita, and Kiran Kumar V. G. "Design and Implementation of Light Weight Cryptography Using Spartan-6 FPGA." In 2024 2nd International Conference on Recent Advances in Information Technology for Sustainable Development (ICRAIS). IEEE, 2024. https://doi.org/10.1109/icrais62903.2024.10811729.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
2

ul Haq, Tanveer, Inam Ul Haq, Naveed Ahmed, and Abdul Razzaq. "A Post Quantum Light Weight Cryptographic Algorithm over Quaternion Integers." In 2024 21st International Bhurban Conference on Applied Sciences and Technology (IBCAST). IEEE, 2024. https://doi.org/10.1109/ibcast61650.2024.10877187.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
3

Buchanan, William J., and Leandros Maglaras. "Review of the NIST Light-Weight Cryptography Finalists." In 2023 19th International Conference on Distributed Computing in Smart Systems and the Internet of Things (DCOSS-IoT). IEEE, 2023. http://dx.doi.org/10.1109/dcoss-iot58021.2023.00079.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
4

Mittal, Shikha, Chetna Monga, Kamal Upreti, Nishant Kumar, Ranjana Dinkar Raut, and Mohammad Shabbir Alam. "Light Weight Cryptography for Cloud-Based E-Health Records." In 2022 7th International Conference on Communication and Electronics Systems (ICCES). IEEE, 2022. http://dx.doi.org/10.1109/icces54183.2022.9835827.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
5

Sivakumar, R., J. Jayapriya, and N. Krishnan. "Comparison Study on SPN Type Light Weight Cryptography Algorithms for IoT." In 2022 International Conference on Inventive Computation Technologies (ICICT). IEEE, 2022. http://dx.doi.org/10.1109/icict54344.2022.9850849.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
6

Shan, Ruiwen, Sheng Di, Jon C. Calhoun, and Franck Cappello. "Exploring Light-weight Cryptography for Efficient and Secure Lossy Data Compression." In 2022 IEEE International Conference on Cluster Computing (CLUSTER). IEEE, 2022. http://dx.doi.org/10.1109/cluster51413.2022.00018.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
7

Prakash, Vishal, Ajay Vikram Singh, and Sunil Kumar Khatri. "A New Model of Light Weight Hybrid Cryptography for Internet of Things." In 2019 3rd International conference on Electronics, Communication and Aerospace Technology (ICECA). IEEE, 2019. http://dx.doi.org/10.1109/iceca.2019.8821924.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
8

Yao, Xuanxia, Xiaoguang Han, and Xiaojiang Du. "A light-weight certificate-less public key cryptography scheme based on ECC." In 2014 23rd International Conference on Computer Communication and Networks (ICCCN). IEEE, 2014. http://dx.doi.org/10.1109/icccn.2014.6911773.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
9

John, Jacob, and Sinciya P. O. "Real-Time Distant Healthcare Monitoring IoT System Secured by Light Weight Cryptography." In 2023 Annual International Conference on Emerging Research Areas: International Conference on Intelligent Systems (AICERA/ICIS). IEEE, 2023. http://dx.doi.org/10.1109/aicera/icis59538.2023.10420248.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
10

Thilagaraj, M., C. Arul Murugan, U. Ramani, C. Ganesh, and P. Sabarish. "A Survey of Efficient Light Weight Cryptography Algorithm for Internet of Medical Things." In 2023 9th International Conference on Advanced Computing and Communication Systems (ICACCS). IEEE, 2023. http://dx.doi.org/10.1109/icaccs57279.2023.10112818.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
Oferujemy zniżki na wszystkie plany premium dla autorów, których prace zostały uwzględnione w tematycznych zestawieniach literatury. Skontaktuj się z nami, aby uzyskać unikalny kod promocyjny!