Results 41 to 50 of about 67,860 (295)
Managed ecosystems of networked objects [PDF]
Small embedded devices such as sensors and actuators will become the cornerstone of the Future Internet. To this end, generic, open and secure communication and service platforms are needed in order to be able to exploit the new business opportunities ...
Bouckaert, Stefan+4 more
core +2 more sources
Hardware Implementation of the GPS authentication [PDF]
In this paper, we explore new area/throughput trade- offs for the Girault, Poupard and Stern authentication protocol (GPS). This authentication protocol was selected in the NESSIE competition and is even part of the standard ISO/IEC 9798. The originality
Dardaillon, Mickaël+2 more
core +4 more sources
RISC-V Instruction Set Extensions for Lightweight Symmetric Cryptography
The NIST LightWeight Cryptography (LWC) selection process aims to standardise cryptographic functionality which is suitable for resource-constrained devices.
Hao Cheng+4 more
doaj +1 more source
Lightweight password hashing scheme for embedded systems [PDF]
Passwords constitute the main mean for authentication in computer systems. In order to maintain the user-related information at the service provider end, password hashing schemes (PHS) are utilized.
A Moradi+5 more
core +1 more source
Toward Lightweight Cryptography: A Survey
The main problem in Internet of Things (IoT) security is how to find lightweight cryptosystems that are suitable for devices with limited capabilities. In this paper, a comprehensive literature survey that discusses the most prominent encryption algorithms used in device security in general and IoT devices in specific has been conducted.
Mohammed, Abujoodeh,+2 more
openaire +2 more sources
Design and implementation of Energy Efficient Lightweight Encryption (EELWE) algorithm for medical applications [PDF]
Proportional to the growth in the usage of Human Sensor Networks (HSN), the volume of the data exchange between Sensor devices is increasing at a rapid pace. In this paper, we have proposed an Energy Efficient Lightweight Encryption (EELWE) algorithm for providing the confidentiality of data at the sensor level, particularly suitable for resource ...
arxiv +1 more source
Secure VANET Authentication Protocol (SVAP) Using Chebyshev Chaotic Maps for Emergency Conditions
It is crucial to support emergency applications provided by vehicular adhoc network (VANET) through enabling vehicles to quickly access to the infrastructure and consequently request rescue services.
Roayat I. Abdelfatah+2 more
doaj +1 more source
A Fault Analytic Method against HB+ [PDF]
The search for lightweight authentication protocols suitable for low-cost RFID tags constitutes an active and challenging research area. In this context, a family of protocols based on the LPN problem has been proposed: the so-called HB-family.
Carrijo, Jose+2 more
core +2 more sources
Secure and Efficient Authentication Scheme in IoT Environments
Optimization of resource consumption and decreasing the response time of authentication requests is an immense urgent requirement for supporting the scalability of resources in IoT environments.
Abhijeet Thakare, Young-Gab Kim
doaj +1 more source
Evaluation of SPN-Based Lightweight Crypto-Ciphers
Lightweight cryptography has recently emerged as a strong requirement for any highly constrained connected device; encryption/decryption processes must strike the balance between speed, area, power efficiency, and security robustness.
Loic Dalmasso+3 more
doaj +1 more source