[图书][B] Perfect Secrecy in IoT: A Hybrid Combinatorial-Boolean Approach

B Zolfaghari, K Bibak - 2022 - books.google.com
Perfectly-secure cryptography is a branch of information-theoretic cryptography. A perfectly-
secure cryptosystem guarantees that the malicious third party cannot guess anything …

FPGA Enactment of Biological Feature Based Authentication Algorithm Using Elliptic Curve Cryptography for IoT Communication

VK Vadladi, D Marshiana - 2024 Second International …, 2024 - ieeexplore.ieee.org
In the modern medical environment, the Internet of Things-enabled devices helps physicians
to control and remotely monitor the device involved in the healthcare sector. Here Biological …

Information-Theoretic Cryptography: A Maneuver in the Trade-Off Space of Cryptography in IoT

B Zolfaghari, K Bibak - Perfect Secrecy in IoT: A Hybrid Combinatorial …, 2022 - Springer
This chapter discusses the reason why we have chosen to study perfectly secure
cryptography (as a branch of information-theoretic cryptography) among the existing …

Using a Blend of Brassard and Benett 84 & Elliptic Curve Digital Signature for Secure Cloud Data Communication

V Srivastava, RK Pathak, A Kumar… - … on electronics and …, 2020 - ieeexplore.ieee.org
The exchange of data has expanded utilizing the web nowadays, but it is not dependable
because, during communication on the cloud, any malicious client can alter or steal the …

An evolutionary predictive security control architecture for healthcare transactions in IoT-based cloud storage

SKB Sangeetha, R Dhaya - … the Potentials of Blockchain Technology for …, 2023 - Elsevier
IoT has advanced significantly in the arena of processing very large volumes of data since
the introduction of IoT cloud-based devices. However, data privacy and overhead …

An Efficient Hardware Implementation of Elliptic Curve Point Multiplication Over GF (2m) on FPGA

R Kumari, T Rout, B Saini, JG Pandey… - … Symposium on VLSI …, 2023 - Springer
Elliptic curve cryptography (ECC) is widely accepted for ensuring secure data exchange
between resource-limited IoT devices. The National Institute of Standards and Technology …

Design of a novel privacy preservation based cyber security system framework for secure medical data transactions in cloud storage

SKB Sangeetha, K Veningston, V Sathya… - … Edge Computing for …, 2023 - Elsevier
Individuals and corporations are increasingly finding it difficult to keep sensitive data safe in
the cloud. As such, there is a need to establish and strengthen cyber security preservation …

[PDF][PDF] RESIDUE NUMBER SYSTEM BASED APPLICATIONS: A LITERATURE REVIEW.

AA Oke, BA Nathaniel… - Annals. Computer …, 2021 - anale-informatica.tibiscus.ro
Residue Number System (RNS) has become one of the most preferred solutions for the
implementation of distributed and ubiquitous computing platforms such as cloud, wireless …

Perfect Secrecy in IoT

B Zolfaghari, K Bibak - Springer
Perfectly secure cryptography is a branch of information-theoretic cryptography. A perfectly
secure cryptosystem guarantees that the malicious third party cannot guess anything …

[PDF][PDF] Authentication mechanism of network communication nodes based on information safety of the Internet of Vehicles.

Q Wu - Proceedings of the Estonian Academy of Sciences, 2021 - kirj.ee
The Internet of Vehicles (IoV) is an important part of intelligent traffic, and the problem of
information safety is an essential task that has to be solved urgently. In this study, the main …