Results 81 to 90 of about 4,106,080 (244)

A Secure and Adaptive Framework for Enhancing Intrusion Detection in IoT Networks Using Incremental Learning and Blockchain

open access: yesSECURITY AND PRIVACY, Volume 8, Issue 4, July/August 2025.
ABSTRACT With the increasing reliance on the Internet of Things devices in various fields, especially in smart homes or smart factories, concerns are increasing about cyber threats targeting intrusion detection systems that protect Internet of Things (IoT) networks.
Zaed S. Mahdi   +2 more
wiley   +1 more source

Random Strip Peeling: A novel lightweight image encryption for IoT devices based on colour planes permutation

open access: yesCAAI Transactions on Intelligence Technology, Volume 10, Issue 2, Page 529-544, April 2025.
Abstract This paper introduces a novel lightweight colour image encryption algorithm, specifically designed for resource‐constrained environments such as Internet of Things (IoT) devices. As IoT systems become increasingly prevalent, secure and efficient data transmission becomes crucial.
Kenan İnce, Cemile İnce, Davut Hanbay
wiley   +1 more source

Differential cryptanalysis of full-round ANU-II ultra-lightweight block cipher

open access: yesInternational Journal of Distributed Sensor Networks, 2022
Lightweight ciphers are often used as the underlying encryption algorithm in resource-constrained devices. Their cryptographic security is a mandatory goal for ensuring the security of data transmission.
Ting Fan   +3 more
doaj   +1 more source

Mem‐Transistor‐Based Gaussian Error–Generating Hardware for Post‐Quantum Cryptography Applications

open access: yesAdvanced Quantum Technologies, Volume 8, Issue 3, March 2025.
The demonstration of a Gaussian error sampler system that leverages the intrinsic stochastic characteristics of mem‐transistor semiconductor devices. The demonstrated Gaussian error sampler significantly reduces computational and memory overhead compared to existing techniques.
Moon‐Seok Kim   +3 more
wiley   +1 more source

A Randomized Non‐overlapping Encryption Scheme for Enhanced Image Security in Internet of Things (IoT) Applications

open access: yesEngineering Reports, Volume 7, Issue 1, January 2025.
A novel image encryption algorithm has been developed to impart security to the digital color images. ABSTRACT The rapid proliferation of Internet of Things (IoT) devices has underscored the critical need to safeguard the data they store and transmit.
Muhammad Aqeel   +6 more
wiley   +1 more source

Linearity in decimation-based generators: an improved cryptanalysis on the shrinking generator

open access: yesOpen Mathematics, 2018
Decimation-based sequence generators are a class of non-linear cryptographic generators designed to be used in hardware implementations. An inherent characteristic of such generators is that their output sequences are interleaved sequences.
Cardell Sara D.   +2 more
doaj   +1 more source

Towards the Links of Cryptanalytic Methods on MPC/FHE/ZK-Friendly Symmetric-Key Primitives

open access: yesIACR Transactions on Symmetric Cryptology, 2023
Symmetric-key primitives designed over the prime field Fp with odd characteristics, rather than the traditional Fn2 , are becoming the most popular choice for MPC/FHE/ZK-protocols for better efficiencies.
Shiyao Chen   +6 more
doaj   +1 more source

Performance analysis of energy efficient improved LEACH protocol in IoT networks

open access: yesIET Communications, Volume 19, Issue 1, January/December 2025.
Abstract The Internet of Things incorporates embedded technologies, wireless sensor networks, control and automation technologies, and wearable devices to enable integrated buildings, enterprises, intelligent homes, and wearable devices. Because sensor nodes have limited power, the energy consumption of the Internet of Things network is critical.
Surbhi Bhatia   +3 more
wiley   +1 more source

Bit-Based Evaluation of Lightweight Block Ciphers SLIM, LBC-IoT, and SLA by Mixed Integer Linear Programming

open access: yesIET Information Security
Many lightweight block ciphers have been proposed for IoT devices that have limited resources. SLIM, LBC-IoT, and SLA are lightweight block ciphers developed for IoT systems.
Nobuyuki Sugio
doaj   +1 more source

Regular subgroups with large intersection

open access: yes, 2018
In this paper we study the relationships between the elementary abelian regular subgroups and the Sylow $2$-subgroups of their normalisers in the symmetric group $\mathrm{Sym}(\mathbb{F}_2^n)$, in view of the interest that they have recently raised for ...
Aragona, Riccardo   +3 more
core   +1 more source

Home - About - Disclaimer - Privacy