Results 21 to 30 of about 22,567 (276)

A Security Framework for JXTA-Overlay [PDF]

open access: yes, 2009
En l'actualitat, la maduresa del camp de la investigació P2P empès a través de nous problemes, relacionats amb la seguretat. Per aquesta raó, la seguretat comença a convertir-se en una de les qüestions clau en l'avaluació d'un sistema P2P, i és important
Arnedo Moreno, Joan   +3 more
core   +3 more sources

I2PA, U-prove, and Idemix: An Evaluation of Memory Usage and Computing Time Efficiency in an IoT Context

open access: yes, 2020
The Internet of Things (IoT), in spite of its innumerable advantages, brings many challenges namely issues about users' privacy preservation and constraints about lightweight cryptography.
AA Ciss   +10 more
core   +1 more source

Trusted-HB: a low-cost version of HB+ secure against Man-in-The-Middle attacks [PDF]

open access: yes, 2008
Since the introduction at Crypto'05 by Juels and Weis of the protocol HB+, a lightweight protocol secure against active attacks but only in a detection based-model, many works have tried to enhance its security.
Bringer, Julien, Chabanne, Herve
core   +2 more sources

Efficient scalar multiplication of ECC using SMBR and fast septuple formula for IoT

open access: yesEURASIP Journal on Wireless Communications and Networking, 2021
In order to solve the problem between low power of Internet of Things devices and the high cost of cryptography, lightweight cryptography is required. The improvement of the scalar multiplication can effectively reduce the complexity of elliptic curve ...
Chong Guo, Bei Gong
doaj   +1 more source

Evaluating the Performance of Lightweight Ciphers in Constrained Environments—The Case of Saturnin

open access: yesSignals, 2022
The use of lightweight cryptographic algorithms is essential for addressing security in highly constrained environments such as the Internet of Things. In this paper, the performance of lightweight block ciphers in such highly constrained environments is
Panagiotis Podimatas   +1 more
doaj   +1 more source

Secure VANET Authentication Protocol (SVAP) Using Chebyshev Chaotic Maps for Emergency Conditions

open access: yesIEEE Access, 2022
It is crucial to support emergency applications provided by vehicular adhoc network (VANET) through enabling vehicles to quickly access to the infrastructure and consequently request rescue services.
Roayat I. Abdelfatah   +2 more
doaj   +1 more source

I2PA : An Efficient ABC for IoT [PDF]

open access: yes, 2019
Internet of Things (IoT) is very attractive because of its promises. However, it brings many challenges, mainly issues about privacy preserving and lightweight cryptography.
Ciss, Abdoul Aziz   +2 more
core   +3 more sources

Managed ecosystems of networked objects [PDF]

open access: yes, 2011
Small embedded devices such as sensors and actuators will become the cornerstone of the Future Internet. To this end, generic, open and secure communication and service platforms are needed in order to be able to exploit the new business opportunities ...
Bouckaert, Stefan   +4 more
core   +2 more sources

RISC-V Instruction Set Extensions for Lightweight Symmetric Cryptography

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2022
The NIST LightWeight Cryptography (LWC) selection process aims to standardise cryptographic functionality which is suitable for resource-constrained devices.
Hao Cheng   +4 more
doaj   +1 more source

LPKI - A Lightweight Public Key Infrastructure for the Mobile Environments

open access: yes, 2008
The non-repudiation as an essential requirement of many applications can be provided by the asymmetric key model. With the evolution of new applications such as mobile commerce, it is essential to provide secure and efficient solutions for the mobile ...
Beheshti, A. A., Toorani, M.
core   +3 more sources

Home - About - Disclaimer - Privacy