Cryptography and Information Security

LY Por, AA Khan - 2024 - mdpi.com
Summary This Special Issue on cryptography and information security presents a diverse
range of contributions, offering valuable insights into various facets of the field. The topics …

Special Issue on Cryptography and Information Security

LY Por, J Yang, CS Ku, AA Khan - Applied Sciences, 2023 - mdpi.com
In today's increasingly connected world, the demand for secure computing and data
protection is soaring [1]. To address this urgent need, our Special Issue presents cutting …

Securing internet-of-things

G Gong - International Symposium on Foundations and Practice …, 2018 - Springer
In this survey, we first present some vulnerabilities and attacks on IoT systems, and
classification of IoT devices, we then show the evolution of the development of lightweight …

[PDF][PDF] Tackling data security and privacy challenges for the Internet of Things

D Raggett - 2016 - w3.org
● Authentication and Key management● IoT devices need to check that the server is who it
says it is● Servers likewise need to check this for IoT devices● Asymmetric Public/Private …

Applied Cryptography in Computer and Communications

B Chen, X Huang - 2021 - Springer
We are delighted to introduce the proceedings of the 2021 European Alliance for Innovation
(EAI) International Conference on Applied Cryptography in Computer and Communications …

Usable Security for an IoT OS: Integrating the Zoo of Embedded Crypto Components Below a Common API

L Boeckmann, P Kietzmann, L Lanzieri… - arXiv preprint arXiv …, 2022 - arxiv.org
IoT devices differ widely in crypto-supporting hardware, ranging from no hardware support to
powerful accelerators supporting numerous of operations including protected key storage …

[图书][B] IoT security: Advances in authentication

M Liyanage, A Braeken, P Kumar, M Ylianttila - 2020 - books.google.com
An up-to-date guide to an overview of authentication in the Internet of Things (IoT) The
Internet of things (IoT) is the network of the countless physical devices that have the …

[PDF][PDF] IOT supported security considerations for network

K Thamizhmaran - WSEAS Transactions on Communications, 2020 - academia.edu
The current IP and other networks such as Power Smart Grids are fast evolving, thus
resulting in diverse connectivity methodologies. This has led to the emergence of" the …

SoK: Computer-aided cryptography

M Barbosa, G Barthe, K Bhargavan… - … IEEE symposium on …, 2021 - ieeexplore.ieee.org
Computer-aided cryptography is an active area of research that develops and applies
formal, machine-checkable approaches to the design, analysis, and implementation of …

[PDF][PDF] IoT Security Best Practices: A Critical Analysis

D BARRERA, C BELLMAN, PC VAN OORSCHOT - ccsl.carleton.ca
IoT Security Best Practices: A Critical Analysis Page 1 IoT Security Best Practices: A Critical
Analysis DAVID BARRERA, CHRISTOPHER BELLMAN, and PAUL C. VAN OORSCHOT∗ …