Gotowa bibliografia na temat „Light weight cryptography”

Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych

Wybierz rodzaj źródła:

Zobacz listy aktualnych artykułów, książek, rozpraw, streszczeń i innych źródeł naukowych na temat „Light weight cryptography”.

Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.

Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.

Artykuły w czasopismach na temat "Light weight cryptography"

1

Alshar’e, Marwan, Sharf Alzu’bi, Ahed Al-Haraizah, Hamzah Ali Alkhazaleh, Malik Jawarneh, and Mohammad Rustom Al Nasar. "Elliptic curve cryptography based light weight technique for information security." Bulletin of Electrical Engineering and Informatics 14, no. 3 (2025): 2300–2308. https://doi.org/10.11591/eei.v14i3.8587.

Pełny tekst źródła
Streszczenie:
Recent breakthroughs in cryptographic technology are being thoroughly scrutinized due to their emphasis on innovative approaches to design, implementation, and attacks. Lightweight cryptography (LWC) is a technological advancement that utilizes a cryptographic algorithm capable of being adjusted to function effectively in various constrained environments. This study provides an in-depth analysis of elliptic curve cryptography (ECC), which is a type of asymmetric cryptographic method known as LWC. This cryptographic approach operates over elliptic curves and has two applications: key exchange and digital signature authentication. Next, we will implement asymmetric cryptographic algorithms and evaluate their efficiency. Elliptic curve elgamal algorithms are implemented for encryption and decryption of data. Elliptic curve Diffie-Hellman key exchange is used for sharing keys. Experimental results have shown that ECC needs small size keys to provide similar security. ECC takes less time in key generation, encryption and decryption of plain text. Time taken by ECC to generate a 2,048 bit long key is 1,653 milliseconds in comparison to 4,258 millisecond taken by Rivest-Shamir-Adleman (RSA) technique.
Style APA, Harvard, Vancouver, ISO itp.
2

Abd Zaid, Mustafa, and Soukaena Hassan. "Proposal Framework to Light Weight Cryptography Primitives." Engineering and Technology Journal 40, no. 4 (2022): 516–26. http://dx.doi.org/10.30684/etj.v40i4.1679.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
3

Ahmed, Mubbashir. "Lightweight Cryptographic Algorithm Development Using Fundamental Cryptographic Techniques." VFAST Transactions on Software Engineering 13, no. 1 (2025): 178–92. https://doi.org/10.21015/vtse.v13i1.2050.

Pełny tekst źródła
Streszczenie:
Cryptography is used to make data and information transmission and computational systems secure over the networks by using mathematical and scientific techniques. The cryptographic algorithm should fulfil the conditions of authentication, confidentiality, integrity and reliability. In today’s era, where digital communication and data storage is increasing day by day and the data leakage, breaches and attacks are continuously rising. The increase in need of strong and secure cryptography algorithms to protect user information that ensures the integrity and confidentiality of data. The existing symmetric cryptographic algorithms like AES or DES, can provide strong security but they have very complex implementations and requires high computational resources. The aim of this paper is to provide a study for the research done in the field of cryptography, cryptographic techniques and to propose and developed a light weight symmetric cryptographic algorithm using different fundamental cryptographic techniques that is secure and fulfils the conditions of authentication, confidentiality, integrity and reliability.
Style APA, Harvard, Vancouver, ISO itp.
4

Alkhudaydi, Malak G., and Adnan A. Gutub. "Integrating Light-Weight Cryptography with Diacritics Arabic Text Steganography Improved for Practical Security Applications." Journal of Information Security and Cybercrimes Research 3, no. 1 (2020): 13–30. http://dx.doi.org/10.26735/fmit1649.

Pełny tekst źródła
Streszczenie:
Cryptography and steganography are combined to provide practical data security. This paper proposes integrating light-weight cryptography with improved Arabic text steganography for optimizing security applications. It uses light-weight cryptography to cope with current limited device capabilities, to provide acceptable required security. The work tests hiding encrypted secret information within Arabic stego-cover texts, using all common diacritics found naturally in the Arabic language. The study considers different challenging situations and scenarios in order to evaluate security practicality. It further carries out simulations on some short texts from the Holy Quran, taking them as standard authentic texts, that are fixed and trusted, therefore providing realistic study feedback that is worth monitoring. Our improved approach features preferred capacity and security, surpassing the best previous diacritics stego approach, showing interesting potential results for attractive enlightening exploration to come.
Style APA, Harvard, Vancouver, ISO itp.
5

Raja, M., Dr S. Dhanasekaran, and Dr V. Vasudevan. "Light Weight Cryptography based Medical Data and Image Encryption Scheme." Webology 18, no. 2 (2021): 88–104. http://dx.doi.org/10.14704/web/v18i2/web18309.

Pełny tekst źródła
Streszczenie:
Many medical companies use cloud technology to collect, distribute and transmit medical records. Given the need for medical information, confidentiality is a key issue. In this study, we propose an encrypted scheme based on encrypted data for an electronic healthcare environment. We use hybrid Attribute based encryption and Triple DES encryption technique (ABETDES) scheme, including identity-based cryptography (IBC), to ensure data privacy through communication channels և to improve the reliability of cloud computing. There are also limited indicators of light processing and storage resources. This solves a serious maintenance problem and ensures that a private key is created where it is not blind. The introduction of a security option, a comprehensive security analysis to protect ciphertext, shows that our program is effective against many known attacks and compared to existing methods.
Style APA, Harvard, Vancouver, ISO itp.
6

Sangari, S., and Martin Leo Manickam. "A LIGHT-WEIGHT CRYPTOGRAPHY ANALYSIS FOR WIRELESS BASED HEALTHCARE APPLICATIONS." Journal of Computer Science 10, no. 10 (2014): 2088–94. http://dx.doi.org/10.3844/jcssp.2014.2088.2094.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
7

B, Akhil, Muzammil Shareef Md, Shalini B, Fairooz SK, and Shaik Mohammed Rafi. "Light weight security coding using PRESENT algorithm for cryptography application." International Journal of VLSI and Signal Processing 7, no. 2 (2020): 1–5. http://dx.doi.org/10.14445/23942584/ijvsp-v7i2p101.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
8

Yalamanchili, Anjani, D. Venkatasekhar, and G. Vijay Kumar. "Iot Based Alzheimer’s Disease Diagnosis Model for Providing Security Using Light Weight Hybrid Cryptography." International Journal on Recent and Innovation Trends in Computing and Communication 11, no. 4 (2023): 148–59. http://dx.doi.org/10.17762/ijritcc.v11i4.6398.

Pełny tekst źródła
Streszczenie:
Security in the Internet of things (IoT) is a broad yet active research area that focuses on securing the sensitive data being circulated in the network. The data involved in the IoT network comes from various organizations, hospitals, etc., that require a higher range of security from attacks and breaches. The common solution for security attacks is using traditional cryptographic algorithms that can protect the content through encryption and decryption operations. The existing solutions are suffering from major drawbacks, including computational complexities, time and space complexities, slower encryption, etc. Therefore, to overcome such drawbacks, this paper introduces an efficient light weight cryptographic mechanism to secure the images of Alzheimer’s disease (AD) being transmitted in the network. The mechanism involves major stages such as edge detection, key generation, encryption, and decryption. In the case of edge detection, the edge maps are detected using the Prewitt edge detection technique. Then the hybrid elliptic curve cryptography (HECC) algorithm is proposed to encrypt and secure the images being transmitted in the network. For encryption, the HECC algorithm combines blowfish with the elliptic curve algorithm to attain a higher range of security. Another significant advantage of the proposed method is selecting the ideal private key, which is achieved using the enhanced seagull optimization (ESO) algorithm. The proposed work has been tested in the Python tool, and the performance is evaluated with the Alzheimer’s dataset, and the outcomes proved its efficacy over the compared methods.
Style APA, Harvard, Vancouver, ISO itp.
9

Alassaf, Norah, and Adnan Gutub. "Simulating Light-Weight-Cryptography Implementation for IoT Healthcare Data Security Applications." International Journal of E-Health and Medical Communications 10, no. 4 (2019): 1–15. http://dx.doi.org/10.4018/ijehmc.2019100101.

Pełny tekst źródła
Streszczenie:
Short period monitoring and emergency notification of healthcare signals is becoming affordable with existence of internet of things (IoT) support. However, IoT does not prevent challenges that may hinder the appropriate safe spread of medical solutions. Confidentiality of data is vital, making a real fear requesting cryptography. The limitations in memory, computations processing, power consumptions, and small-size devices contradict the robust encryption process asking for help of low-weight-cryptography to handle practically. This article presents a comparative analysis of performance evaluation of three trusted candidate encryption algorithms, namely AES, SPECK and SIMON, which are simulated and compared in details to distinguish who has the best behaviour to be nominated for a medical application. These encryption algorithms are implemented and evaluated in regard to the execution time, power consumption, memory occupation and speed. The implementation is carried out using the Cooja simulator running on Contiki operating system showing interesting attractive results.
Style APA, Harvard, Vancouver, ISO itp.
10

MS, Dhruva, Gururaj H L, and Ramesh B. "Cryptography Based Light-Weight Attribute Encryption Scheme for Internet of Things." International Journal of Engineering and Applied Computer Science 02, no. 05 (2017): 160–64. http://dx.doi.org/10.24032/ijeacs/0205/03.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
Więcej źródeł

Rozprawy doktorskie na temat "Light weight cryptography"

1

Reyes, Torres Oscar Mauricio [Verfasser]. "Neural Synchronization and Light-weight Cryptography in Embedded Systems / Oscar Mauricio Reyes Torres." Aachen : Shaker, 2012. http://d-nb.info/106773631X/34.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
2

Nimgaonkar, Satyajeet. "Secure and Energy Efficient Execution Frameworks Using Virtualization and Light-weight Cryptographic Components." Thesis, University of North Texas, 2014. https://digital.library.unt.edu/ark:/67531/metadc699986/.

Pełny tekst źródła
Streszczenie:
Security is a primary concern in this era of pervasive computing. Hardware based security mechanisms facilitate the construction of trustworthy secure systems; however, existing hardware security approaches require modifications to the micro-architecture of the processor and such changes are extremely time consuming and expensive to test and implement. Additionally, they incorporate cryptographic security mechanisms that are computationally intensive and account for excessive energy consumption, which significantly degrades the performance of the system. In this dissertation, I explore the domain of hardware based security approaches with an objective to overcome the issues that impede their usability. I have proposed viable solutions to successfully test and implement hardware security mechanisms in real world computing systems. Moreover, with an emphasis on cryptographic memory integrity verification technique and embedded systems as the target application, I have presented energy efficient architectures that considerably reduce the energy consumption of the security mechanisms, thereby improving the performance of the system. The detailed simulation results show that the average energy savings are in the range of 36% to 99% during the memory integrity verification phase, whereas the total power savings of the entire embedded processor are approximately 57%.
Style APA, Harvard, Vancouver, ISO itp.
3

Adekunle, Andrew A. "Design and analysis of light-weight symmetric cryptographic frameworks and constructs for secure packet mode wireless communication." Thesis, University of Greenwich, 2012. http://gala.gre.ac.uk/9806/.

Pełny tekst źródła
Streszczenie:
This thesis reports research undertaken to address the deficiencies that existing standardised cryptographic constructs exhibit when securing packet mode wireless communication in WSN. The aim of the research is to devise innovative cryptographic frameworks, which will facilitate design and implementation of light-weight symmetric cryptographic modular constructs. Four cryptographic frameworks have been devised and block cipher based light-weight constructs using the frameworks have been designed and benchmarked against contemporary standard constructs. The constructs introduced in this dissertation, proved to be better suited to providing secure packet mode data communication, in applications utilising wireless networks consisting of characteristically constrained nodes. The four proposed frameworks are: - The Zone-based framework for data packet integrity and authentication security services is proposed and described. The Quicker Block Chaining (QBC) family of message authentication constructs designed using the framework, are shown, via software simulation, to operate with better efficiency (i.e. uses fewer instruction cycles) than similar contemporary standard constructs and with a comparable level of security. - The Hybrid Encryption Mode (HEM) framework for data packet confidentiality security service is proposed and described. The HEM framework facilitated the design of constructs that provide probabilistic, randomising and tweakable encryption. - The Joint Cypher Mode (JCM) framework for authenticated encryption with associated-data (AEAD) security service is proposed and described. The range of constructs designed using the JCM framework, are shown, via software simulation and practical deployment, to Design and Analysis of Light-weight Symmetric Cryptographic Frameworks and Constructs for Secure Packet Mode Wireless Communication operate with better efficiency (i.e. uses fewer instruction cycles) than contemporary standard constructs. - The Joint Authenticated Combined Mode (JACM) framework for authenticate authenticated-encryption with associated-data (AAEAD) security service is proposed and described. The new AAEAD secure packet paradigm addresses a limitation and cryptographic protection failure of the standardised AEAD secure packet paradigm, in communication scenarios when untrustworthy intermediary forwarding nodes are utilised to authenticate and relay packets. The outcomes of the research undertaken are relevant to practitioners and cryptographic engineers that require symmetric cryptographic light-weight constructs for providing secure packet mode communications. It is shown that the resulting light-weight symmetric cryptographic constructs are better suited to providing secure packet mode wireless networked communication.
Style APA, Harvard, Vancouver, ISO itp.
4

Wang, Hsi-Wen, and 王錫文. "A study on positioning mechanism and light-weight cryptography on active RFID systems." Thesis, 2013. http://ndltd.ncl.edu.tw/handle/ab4fvr.

Pełny tekst źródła
Streszczenie:
博士<br>國立臺北科技大學<br>電腦與通訊研究所<br>101<br>This study includes two parts: one is to implement and experiment an indoor positioning system based on an active Radio Frequency Identification (RFID) system, and the other is an authentication protocol with light weight cryptography implemented in an active RFID system. The first part of this study is mainly to implement an active RFID system for an indoor positioning service. The indoor positioning system uses four reference tags for the reference addresses and a tracked object equipped with an active tag. Reference tags transmit the received signal strength indicator (RSSI) and the unique electronic product code (EPC) back to the reader through wireless transmission. Then the back-end system employs the information which is received from the reference tags to determine the location of the tracked object by computing the geometric relation between the reference tags and the tracked object. Due to the radio signal being vulnerable to the interferences from the terrain and obstacles while propagating, readers are likely to receive signals with bad quality. This drawback can decrease the positioning accuracy. Therefore, this study sorts out several issues that could affect the positioning accuracy and probes into the influence degree of distance errors via the experiment. The results show that the distance error within 3.34 m is as high as 90% of total estimated positions in a 10 m × 10 m region where four coordinate references are arranged. Beside location function, RFID systems need to face users concerns for privacy issues. Improving the security and privacy of RFID system is only the way to solve this issue. Encrypted information passed between tags and readers can avoid the attacker getting the information of tags, but it still cannot avoid adversary tracking tags by radio fingerprint. To prevent tracking attack, mutual authentication must be employed in the process of communication between tags and readers. The second part of this study integrates an authentication mechanism with public key encryption, embedded computation, and wireless communication technologies into an active RFID system. In the active RFID system, a secure RFID tag intermittently transmits cipher text to a RFID reader which then transmits in multi-hop relaying to a back-end platform to perform data comparison for authentication. Tame Transformation Signatures (TTS) is used in the system to protect the plain text from adversaries. The TTS algorithm is from the family of asymmetric public key systems, and it has the advantages of high security, high-speed key generation, signature, and suitability to embedded systems and is thus suitable to be used in our authentication system. Therefore, TTS has superiority such as better security, fast key generation, complex algorithm, and low signature delay. TTS algorithm can perform authentication more effectively in the active RFID system. There are three major contributions in the second part of this study. The first is a fully designed and implemented an active RFID system, which includes active tags and readers. In the RFID system, tags can stand by and keep working in long term after getting started. The second is a successfully implemented active RFID system with TTS cryptography and authentication mechanisms to protect the content in tags to ensure the security in multi-hop transmission. The last is adopting multi-hop relays to extend distance between Readers.
Style APA, Harvard, Vancouver, ISO itp.
5

Ming-KungSun and 孫明功. "Light-Weight Cryptographic Protocols and Applications." Thesis, 2013. http://ndltd.ncl.edu.tw/handle/13464593028480040489.

Pełny tekst źródła
Streszczenie:
博士<br>國立成功大學<br>電腦與通信工程研究所<br>101<br>The concept of PKI is a cornerstone of modern security solutions. Its usage permeates many different applications where digital signatures, secure communications, and identity management play primary or auxiliary roles. It can be applied as a helper technology which assist other frameworks by lending its inherent attributes. This dissertation details three distinct applications of PKI concepts in three very different fields. Their respective contributions vary greatly, but they all owe their realization to the concepts of PKI. First, in the area of Distributed Sensor Networks, a key distribution model is proposed which provides the feature of trusted communication while also giving the benefit of much lower energy use for the low powered sensor devices. The next application of PKI is in the framework of a distributed DRM model. In this model, PKI is employed to provide the benefits of identity management, authentication and revocation in combination with smart cards to additionally provide anonymity, portability, and regional limitations. The last topic is in the area of Vehicular Networking where PKI is part of the associated standard that supports and is supported by our proposed routing protocol. The concepts of PKI are pervasive in the field of computer and network security. This dissertation show three examples in the areas of sensor networks, digital copyrights, and vehicular networks where PKI concepts are employed to provide some of the benefits that come with using PKI.
Style APA, Harvard, Vancouver, ISO itp.

Części książek na temat "Light weight cryptography"

1

Buchanan, William J. "Light-weight Cryptography and Other Methods." In Cryptography. River Publishers, 2022. http://dx.doi.org/10.1201/9781003337751-10.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
2

Abdelraheem, Mohamed Ahmed, Julia Borghoff, Erik Zenner, and Mathieu David. "Cryptanalysis of the Light-Weight Cipher A2U2." In Cryptography and Coding. Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-25516-8_23.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
3

Al Shebli, Hessa Mohammed Zaher, and Babak D. Beheshti. "Light Weight Cryptography for Resource Constrained IoT Devices." In Proceedings of the Future Technologies Conference (FTC) 2018. Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-030-02686-8_16.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
4

Jilna, Payingat, and P. P. Deepthi. "Light Weight Key Establishment Scheme for Wireless Sensor Networks." In Security, Privacy, and Applied Cryptography Engineering. Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-49445-6_7.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
5

Hamsha, K., and G. S. Nagaraja. "Threshold Cryptography Based Light Weight Key Management Technique for Hierarchical WSNs." In Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering. Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-20615-4_14.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
6

Dandin, Theodore Jesudas E., D. Krishnaveni, and K. Chandrasekhar. "Light Weight Cryptography and Its Application in Resource Constrained Environment Using Reversible Logic." In Proceedings of the 2nd International Conference on Recent Trends in Machine Learning, IoT, Smart Cities and Applications. Springer Singapore, 2022. http://dx.doi.org/10.1007/978-981-16-6407-6_43.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
7

Yadav, Sameer, Surepalli Venkataratnam, P. Balaji Srikaanth, Jetti Madhavi, A. Basi Reddy, and R. Senthamil Selvan. "Development of Light Weight Authentication Protocol Based on Cryptography to Access the IoT Device." In Communications in Computer and Information Science. Springer Nature Switzerland, 2024. http://dx.doi.org/10.1007/978-3-031-73494-6_11.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
8

Sridharan, Ravi, and Thangakumar Jeyaprakash. "Security for Data in IOT Using a New APS Elliptic Curve Light Weight Cryptography Algorithm." In Artificial Intelligence Techniques for Advanced Computing Applications. Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-15-5329-5_13.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
9

Shankar, K., and Mohamed Elhoseny. "An Optimal Light Weight Cryptography—SIMON Block Cipher for Secure Image Transmission in Wireless Sensor Networks." In Lecture Notes in Electrical Engineering. Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-20816-5_2.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
10

Sasikaladevi, N., N. Mahalakshmi, and N. Archana. "LEACH- Genus 2 Hyper Elliptic Curve Based Secured Light-Weight Visual Cryptography for Highly Sensitive Images." In Communications in Computer and Information Science. Springer Singapore, 2018. http://dx.doi.org/10.1007/978-981-13-1810-8_30.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.

Streszczenia konferencji na temat "Light weight cryptography"

1

Poojari, Asmita, and Kiran Kumar V. G. "Design and Implementation of Light Weight Cryptography Using Spartan-6 FPGA." In 2024 2nd International Conference on Recent Advances in Information Technology for Sustainable Development (ICRAIS). IEEE, 2024. https://doi.org/10.1109/icrais62903.2024.10811729.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
2

ul Haq, Tanveer, Inam Ul Haq, Naveed Ahmed, and Abdul Razzaq. "A Post Quantum Light Weight Cryptographic Algorithm over Quaternion Integers." In 2024 21st International Bhurban Conference on Applied Sciences and Technology (IBCAST). IEEE, 2024. https://doi.org/10.1109/ibcast61650.2024.10877187.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
3

Buchanan, William J., and Leandros Maglaras. "Review of the NIST Light-Weight Cryptography Finalists." In 2023 19th International Conference on Distributed Computing in Smart Systems and the Internet of Things (DCOSS-IoT). IEEE, 2023. http://dx.doi.org/10.1109/dcoss-iot58021.2023.00079.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
4

Mittal, Shikha, Chetna Monga, Kamal Upreti, Nishant Kumar, Ranjana Dinkar Raut, and Mohammad Shabbir Alam. "Light Weight Cryptography for Cloud-Based E-Health Records." In 2022 7th International Conference on Communication and Electronics Systems (ICCES). IEEE, 2022. http://dx.doi.org/10.1109/icces54183.2022.9835827.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
5

Sivakumar, R., J. Jayapriya, and N. Krishnan. "Comparison Study on SPN Type Light Weight Cryptography Algorithms for IoT." In 2022 International Conference on Inventive Computation Technologies (ICICT). IEEE, 2022. http://dx.doi.org/10.1109/icict54344.2022.9850849.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
6

Shan, Ruiwen, Sheng Di, Jon C. Calhoun, and Franck Cappello. "Exploring Light-weight Cryptography for Efficient and Secure Lossy Data Compression." In 2022 IEEE International Conference on Cluster Computing (CLUSTER). IEEE, 2022. http://dx.doi.org/10.1109/cluster51413.2022.00018.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
7

Prakash, Vishal, Ajay Vikram Singh, and Sunil Kumar Khatri. "A New Model of Light Weight Hybrid Cryptography for Internet of Things." In 2019 3rd International conference on Electronics, Communication and Aerospace Technology (ICECA). IEEE, 2019. http://dx.doi.org/10.1109/iceca.2019.8821924.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
8

Yao, Xuanxia, Xiaoguang Han, and Xiaojiang Du. "A light-weight certificate-less public key cryptography scheme based on ECC." In 2014 23rd International Conference on Computer Communication and Networks (ICCCN). IEEE, 2014. http://dx.doi.org/10.1109/icccn.2014.6911773.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
9

John, Jacob, and Sinciya P. O. "Real-Time Distant Healthcare Monitoring IoT System Secured by Light Weight Cryptography." In 2023 Annual International Conference on Emerging Research Areas: International Conference on Intelligent Systems (AICERA/ICIS). IEEE, 2023. http://dx.doi.org/10.1109/aicera/icis59538.2023.10420248.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
10

Thilagaraj, M., C. Arul Murugan, U. Ramani, C. Ganesh, and P. Sabarish. "A Survey of Efficient Light Weight Cryptography Algorithm for Internet of Medical Things." In 2023 9th International Conference on Advanced Computing and Communication Systems (ICACCS). IEEE, 2023. http://dx.doi.org/10.1109/icaccs57279.2023.10112818.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
Oferujemy zniżki na wszystkie plany premium dla autorów, których prace zostały uwzględnione w tematycznych zestawieniach literatury. Skontaktuj się z nami, aby uzyskać unikalny kod promocyjny!

Do bibliografii