Results 61 to 70 of about 67,860 (295)

Lightweight Cryptography for Distributed PKI Based MANETS

open access: yesInternational journal of Computer Networks & Communications, 2018
Abstract. Because of lack of infrastructure and Central Authority(CA), secure communication is a challenging job in MANETs. A lightweight security solution is needed in MANET to balance its nodes resource tightness and mobility feature. The role of CA should be decentralized in MANET because the network is managed by the nodes themselves without any ...
N. Chaitanya Kumar   +3 more
openaire   +4 more sources

Modeling and Accessing Smart Materials with Integrity Constraints in the Shapes Constraint Language and Ontologies—The SmaDi Way

open access: yesAdvanced Engineering Materials, EarlyView.
Integrity constraints enforce consistency and completeness on data. The article discusses a newly developed validator for checking integrity constraints in Shapes Constraint Language (SHACL) through reduction to SPARQL Protocol and RDF Query Language (SPARQL) queries. It can be used with systems for ontology‐based database access.
Özgür L. Özçep   +5 more
wiley   +1 more source

A Survey on Lightweight Cryptographic Algorithms in IoT

open access: yesCybernetics and Information Technologies
The Internet of Things (IoT) will soon penetrate every aspect of human life. Several threats and vulnerabilities are present due to the different devices and protocols used in an IoT system.
Suryateja P. S., Rao K. Venkata
doaj   +1 more source

Comprehensive Review and Analysis of Cryptography Techniques in Cloud Computing

open access: yesIEEE Access
Cloud computing is a fast-growing industry that offers various online services, including software, computing resources, and databases. Its payment model is usage-based, whereas consistency is based on resource-sharing.
K. Sasikumar, Sivakumar Nagarajan
doaj   +1 more source

Review of the NIST Light-weight Cryptography Finalists [PDF]

open access: yesarXiv, 2023
Since 2016, NIST has been assessing lightweight encryption methods, and, in 2022, NIST published the final 10: ASCON, Elephant, GIFT-COFB, Grain128-AEAD, ISAP, Photon-Beetle, Romulus, Sparkle, TinyJambu, and Xoodyak. At the time that the article was written, NISC announced ASCOn as the chosen method that will be published as NIST'S lightweight ...
arxiv  

Lightweight Cryptography and RFID: Tackling the Hidden Overhead

open access: yesThe KSII Transactions on Internet and Information Systems, 2010
The field of lightweight cryptography has developed significantly over recent years and many impressive implementation results have been published. However these results are often concerned with a core computation and when it comes to a real implementation there can be significant hidden overheads. In this paper we consider the case of CRYPTOGPS and we
Frank Vater   +3 more
openaire   +3 more sources

Concepts for a Semantically Accessible Materials Data Space: Overview over Specific Implementations in Materials Science

open access: yesAdvanced Engineering Materials, EarlyView.
This manuscript presents advances in digital transformation within materials science and engineering, emphasizing the role of the MaterialDigital Initiative. By testing and applying concepts such as ontologies, knowledge graphs, and integrated workflows, it promotes semantic interoperability and data‐driven innovation. The article reviews collaborative
Bernd Bayerlein   +44 more
wiley   +1 more source

WG-8: A Lightweight Stream Cipher for Resource-Constrained Smart Devices

open access: yesEAI Endorsed Transactions on Security and Safety, 2015
Lightweight cryptographic primitives are essential for securing pervasive embedded devices like RFID tags, smart cards, and wireless sensor nodes. In this paper, we present a lightweight stream cipher WG-8, which is tailored from the well-known Welch ...
Xinxin Fan   +2 more
doaj   +1 more source

SKINNY-AEAD and SKINNY-Hash

open access: yesIACR Transactions on Symmetric Cryptology, 2020
We present the family of authenticated encryption schemes SKINNY-AEAD and the family of hashing schemes SKINNY-Hash. All of the schemes employ a member of the SKINNY family of tweakable block ciphers, which was presented at CRYPTO 2016, as the underlying
Christof Beierle   +8 more
doaj   +1 more source

Smart Rubber Extrusion Line Combining Multiple Sensor Techniques for AI‐Based Process Control

open access: yesAdvanced Engineering Materials, EarlyView.
This publication presents a digitalization approach for a laboratory rubber extrusion line, employing innovative measurement methods and artificial intelligence (AI)‐based process control. The results demonstrate that the measurement systems are capable of detecting changes in the process and extrudate quality.
Alexander Aschemann   +18 more
wiley   +1 more source

Home - About - Disclaimer - Privacy