Algorithmic security is insufficient: A comprehensive survey on implementation attacks haunting post-quantum security

AC Canto, J Kaur, MM Kermani… - arXiv preprint arXiv …, 2023 - arxiv.org
This survey is on forward-looking, emerging security concerns in post-quantum era, ie, the
implementation attacks for 2022 winners of NIST post-quantum cryptography (PQC) …

A review on security implementations in soft-processors for IoT applications

MA Caraveo-Cacep, R Vázquez-Medina… - Computers & Security, 2024 - Elsevier
With the increase in the number of devices connected to the Internet, the need to maintain
and harden information security in Internet systems has significantly increased. This has led …

[HTML][HTML] Machine learning-based ransomware classification of Bitcoin transactions

O Dib, Z Nan, J Liu - Journal of King Saud University-Computer and …, 2024 - Elsevier
Ransomware presents a significant threat to the security and integrity of cryptocurrency
transactions. This research paper explores the intricacies of ransomware detection in …

A rapid oriented detection method of virtual components for augmented assembly

B Du, J Guo, J Guo, L Wang, X Li - Expert Systems with Applications, 2024 - Elsevier
Augmented assembly provides intuitive assembly guidelines to the assembly operators.
With assembly tasks developing toward diversification, the position of virtual components …

[HTML][HTML] An optimized hybrid encryption framework for smart home healthcare: Ensuring data confidentiality and security

O Popoola, MA Rodrigues, J Marchang, A Shenfield… - Internet of Things, 2024 - Elsevier
This study proposes an optimized hybrid encryption framework combining ECC-256r1 with
AES-128 in EAX mode, tailored for smart home healthcare environments, and conducts a …

[HTML][HTML] A new scheme of 2: 1 photonic multiplexer and multiplexer-based NOT, OR, AND logic gates in electro-optic Mach–Zehnder interferometer

SK Das, N Pahari - e-Prime-Advances in Electrical Engineering …, 2023 - Elsevier
This paper introduces the development of NOT, OR, and AND logic gates utilizing a 2: 1
Multiplexer (MUX) based on a titanium-diffused lithium niobate electro-optic Mach–Zehnder …

Evaluation of physical education teaching effect using Random Forest model under artificial intelligence

X Jiang, Y Du, Y Zheng - Heliyon, 2024 - cell.com
This work aims to optimize the physical education (PE) teaching effect based on deep
learning (DL) to cultivate high-level college students better. Firstly, the present situation of …

[HTML][HTML] Pairing-free proxy re-encryption scheme with equality test for data security of IoT

G Han, L Li, B Qin, D Zheng - Journal of King Saud University-Computer …, 2024 - Elsevier
The construction of IoT cloud platform brings great convenience to the storage of massive
IoT node data. To ensure security of data collected by the IoT nodes, the data must be …

Understanding perspectives on personal data privacy in Internet of Things (IoT): A Systematic Literature Review (SLR)

A Coiduras-Sanagustín, E Manchado-Pérez… - Heliyon, 2024 - cell.com
As the number of Internet users grows, the increase in smart devices interconnected through
the Internet of Things (IoT) have contributed to improvements in the functionality of everyday …

[HTML][HTML] Advancing producer mobility management in Named Data Networking: A comprehensive analytical model

A Abrar, ASCM Arif, KM Zaini, MH Omar… - Journal of King Saud …, 2024 - Elsevier
This paper introduces a transformative approach to managing producer mobility in Named
Data Networking (NDN). It presents a novel analytical model known as Producer Mobility …