Results 61 to 70 of about 22,603 (282)

Lightweight cryptographic algorithm based on trigonometry, dedicated on encryption of short messages

open access: yesTASK Quarterly
The IoT technology is currently used in many areas and marked by growing popularity. On the one hand, the IoT makes our lives easier, on the other hand, it presents challenges in terms of security and privacy protection.
Wiesław Maleszewski
doaj   +1 more source

Lightweight Quantum Encryption for Secure Transmission of Power Data in Smart Grid

open access: yesIEEE Access, 2019
The rise of the smart grid, which applies the Internet and smart metering technologies to the power system, results in massive, heterogeneous power data and a large number of attacks on the smart grid and causes great threats to the confidentiality and ...
Yuancheng Li, Pan Zhang, Rong Huang
doaj   +1 more source

Battery‐Free Dual‐Channel Wireless Neurostimulator Using Passive Circuitry for Neuropathic Pain Modulation

open access: yesAdvanced Healthcare Materials, EarlyView.
A compact, wireless neural stimulator featuring a novel tapping inductor enables selective and independent stimulation of the motor cortex in rats via a single receiver coil. This minimally invasive system effectively reduces neuropathic pain through targeted cortical activation, offering a new avenue for bioelectronic pain therapies and advancing ...
Jeongju Moon   +9 more
wiley   +1 more source

LIGHTWEIGHT CRYPTOGRAPHY METHOD IN THE INTERNET OF THINGS USING ELLIPTIC CURVE AND CROW SEARCH ALGORITHM

open access: yesScience Journal of University of Zakho, 2023
The Internet of Things (IoT) as an important technology consists of a heterogeneous and huge number of devices that generates an enormous amount of data in various applications.
Arkan A. Saffer   +2 more
doaj   +1 more source

Efficient and Low-Cost RFID Authentication Schemes [PDF]

open access: yes, 2011
Security in passive resource-constrained Radio Frequency Identification (RFID) tags is of much interest nowadays. Resistance against illegal tracking, cloning, timing, and replay attacks are necessary for a secure RFID authentication scheme.
Miyaji, Atsuko   +2 more
core   +1 more source

Body Biofluids for Minimally‐Invasive Diagnostics: Insights, Challenges, Emerging Technologies, and Clinical Potential

open access: yesAdvanced Healthcare Materials, EarlyView.
Recent advances in diagnostics have accelerated the development of miniaturized wearable technologies for the continuous monitoring of diseases. This paradigm is shifting healthcare away from invasive, centralized blood tests toward decentralized monitoring, using alternative body biofluids.
Lanka Tata Rao   +2 more
wiley   +1 more source

Temporally Reconfigurable Reservoir Computing with Flexible Electrolyte‐Gated TFTs for High‐Performance Neuromorphic Processing

open access: yesAdvanced Materials, EarlyView.
A temporally reconfigurable reservoir computing system is developed using ultrathin, flexible, all‐solid‐state electrolyte‐gated thin‐film transistors (UFLEX TFTs). By simply tuning temporal dynamics electrically, the system achieves 93.7% accuracy for MNIST handwritten digits, 90.3% for CIFAR‐10 images, and 81.8% for chest X‐rays, surpassing CNNs in ...
Kang Hyun Lee   +9 more
wiley   +1 more source

Compact implementations of Curve Ed448 on low‐end IoT platforms

open access: yesETRI Journal, 2019
Elliptic curve cryptography is a relatively lightweight public‐key cryptography method for key generation and digital signature verification. Some lightweight curves (eg, Curve25519 and Curve Ed448) have been adopted by upcoming Transport Layer Security ...
Hwajeong Seo
doaj   +1 more source

A Lightweight Pseudorandom Number Generator for Securing the Internet of Things

open access: yesIEEE Access, 2017
Lightweight cryptography aims to address the security demands in resource-constrained hardware and software environments, such as the Internet of Things (IoT).
Amalia Beatriz Orue Lopez   +3 more
doaj   +1 more source

Nonce‐misuse resilience of Romulus‐N and GIFT‐COFB

open access: yesIET Information Security, 2023
Nonce‐misuse resilience (NMRL) security of Romulus‐N and GIFT‐COFB is analysed, the two finalists of NIST Lightweight Cryptography project for standardising lightweight authenticated encryption. NMRL, introduced by Ashur et al.
Akiko Inoue   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy