Results 271 to 280 of about 23,485 (319)
Quantum resilient security framework for privacy preserving AI in Apple MM1 on device architecture. [PDF]
Umer N +4 more
europepmc +1 more source
Enhanced image hash using cellular automata with sponge construction and elliptic curve cryptography for secure image transaction. [PDF]
Ibrahim MM +6 more
europepmc +1 more source
SMAD-LDS: enhanced secure message authentication and dissemination with lightweight digital signature in the Internet of Vehicles. [PDF]
Ahmed IZ, Hifny Y, Sadek RA.
europepmc +1 more source
Some of the next articles are maybe not open access.
Related searches:
Related searches:
Proceedings of the 8th International Conference on Security of Information and Networks, 2015
The escalating number of the most various intelligent devices having Internet connection will be the defining direction of development of the Internet for the next years. Already now 98.8% of all manufactured microprocessors are used in the embedded applications and only 1.2% -- in traditional computers. Along with traditional Internet devices, such as
openaire +1 more source
The escalating number of the most various intelligent devices having Internet connection will be the defining direction of development of the Internet for the next years. Already now 98.8% of all manufactured microprocessors are used in the embedded applications and only 1.2% -- in traditional computers. Along with traditional Internet devices, such as
openaire +1 more source
Lightweight cryptography for RFID devices
IET Conference on Wireless, Mobile and Multimedia Networks, 2008We report on a collaboration project connected to net-on-demand. The aim is to develop techniques for secure communication on inductively coupled channels.
A. Barbero +3 more
openaire +1 more source
Lightweight Encryption Using Incremental Cryptography
2021Network-on-chip (NoC) has become the standard communication fabric for on-chip components in modern System-on-chip (SoC) designs. Since NoC has visibility to all communications in the SoC, it has been one of the primary targets for security attacks.
Subodha Charles, Prabhat Mishra
openaire +1 more source
Lightweight cryptography for constrained devices
2014 International Symposium on Integrated Circuits (ISIC), 2014Lightweight cryptography is a rapidly evolving research field that responds to the request for security in resource constrained devices. This need arises from crucial pervasive IT applications, such as those based on RFID tags where cost and energy constraints drastically limit the solution complexity, with the consequence that traditional cryptography
ALIPPI, CESARE +2 more
openaire +2 more sources
Lightweight Cryptography for Low Cost RFID: A New Direction in Cryptography
2008The primary functionality of a modern radio frequency identification (RFID) system is that of identifying objects through a uniquely formatted number kept on each label (also called a tag) as a data field identifier with the associated data being stored in a backend database system.
Ranasinghe, D. +3 more
openaire +2 more sources

