A Secure and Energy-Efficient Cross-Layer Network Architecture for the Internet of Things. [PDF]
Mustafa R +4 more
europepmc +1 more source
A custom hash algorithm for hosting secure gray scale image repository in public cloud. [PDF]
Murugesan V +2 more
europepmc +1 more source
Hybrid cryptographic approach for strengthening IoT and 5G/B5G network security. [PDF]
Kumar A, Singh P, Kamble DP, Singh I.
europepmc +1 more source
Tiny Security Hole: First-Order Vulnerability of Masked SEED and Its Countermeasure. [PDF]
Kim JH, Han DG.
europepmc +1 more source
Exploring security threats and solutions Techniques for Internet of Things (IoT): from vulnerabilities to vigilance. [PDF]
Sahu SK, Mazumdar K.
europepmc +1 more source
Efficient implementation of the linear layer of block ciphers with large MDS matrices based on a new lookup table technique. [PDF]
Luong TT, Van Long N, Vo B.
europepmc +1 more source
A combinatory approach of non-chain ring and henon map for image encryption application. [PDF]
Mohi Ud Din S +4 more
europepmc +1 more source
Differential Cryptanalysis of Feistel’s Iterated Block Ciphers
Telizhenko, Alexander, Limar, Sergey
openaire +1 more source
Decentralized energy optimization using blockchain with battery storage and electric vehicle networks. [PDF]
Chinnaperumal S +7 more
europepmc +1 more source
A secure end-to-end communication framework for cooperative IoT networks using hybrid blockchain system. [PDF]
Erukala SB +6 more
europepmc +1 more source

