A novel QKD approach to enhance IIOT privacy and computational knacks

KK Singamaneni, G Dhiman, S Juneja, G Muhammad… - Sensors, 2022 - mdpi.com
The industry-based internet of things (IIoT) describes how IIoT devices enhance and extend
their capabilities for production amenities, security, and efficacy. IIoT establishes an …

[PDF][PDF] Dynamic keys generation for internet of things

OS Guma'a, QM Hussein, ZT Mustafa - … Indonesian Journal of …, 2019 - academia.edu
In several aspects, interest in IoT has become considerable by researchers and academics
in recent years. Data security becomes one of the important challenges facing development …

[PDF][PDF] Implementation Dual Parallelism Cybersecurity Architecture on FPGA.

NQ Mohammed, A Amir, MH Salih, H Arrfou… - J. Commun., 2022 - jocm.us
This paper presents an efficient parallelism architecture that uses a dual-computing engine
architecture to better throughput using both spatial and temporal parallelism on FPGA …

Design Hybrid Architecture to Implement AES Algorithm on FPGA for IoT Applications

NQ Mohammed, A Amir, MH Salih… - Baghdad Science …, 2024 - bsj.uobaghdad.edu.iq
High-security cryptography algorithms like AES require high computational capabilities to
achieve information security. Therefore, it is necessary to use parallel computing …

A Federated Algorithm for the Lightweight Generation of High-Entropy Keys in Distributed Computing Systems

B Bordel, R Alcarria, T Robles - World Conference on Information Systems …, 2023 - Springer
To build robust secure channels for information exchange, distributed computing systems
must generate and handle high-entropy secret keys. However, solutions to generate those …

[PDF][PDF] Design and Implementation of True Parallelism Quad-Engine Cybersecurity Architecture on FPGA

NQ Mohammed, A Amir, MH Salih… - International Journal of …, 2022 - academia.edu
Applications, such as Internet of Things, deal with huge amount of transmitted, processed
and stored images that required a high computing capability. Therefore, there is a need a …

[PDF][PDF] Arabic Printed Word Recognition For Encrypted Document Management

FA Abdul-Aziz - 2022 - researchgate.net
Word recognition on the digital images is an analytical area that aims to construct a
computer system that can mechanically scan text from images. Documents are now …

Retrieving E-learning document using encrypted semantic words

F Amer, QM Hussein, MSM Altaei - Journal of Madenat Alelem …, 2022 - 116.203.176.164
The process of retrieving document images in digital media depending on their content is
difficult, especially when the number of images is very large. Therefore, there is a need to …

[PDF][PDF] Modified Public Key Cryptosystem for the Internet of Things Applications to Improve Security and Processing Speed

O SaptiGuma'aa, QM Husseinb, O SadeqSalmanc… - 2020 - academia.edu
Internet of things (IoT) deals with massive collected data. Most of these data are personality
information that needs to be protected from hacking and unauthorized access. In other hand …