Technical Analysis and Design of a Secure Campus Area Network and Monitoring System

M Hasan - 2023 International Conference on Information and …, 2023 - ieeexplore.ieee.org
The secure transfer of information on campus is of paramount importance. Having a
monitoring system is crucial to stop attacks and keep data communication safe. To …

[PDF][PDF] Implementation of schnorr signcryption algorithm on dsp

A Elshobaky, M Rasslan, S Guirguis - International Journal of …, 2015 - academia.edu
The lack of data security in public mobile telecommunication system increases the need for
a strong data protection and security mechanisms. Cryptography is considered as one of the …

Real-world performance analysis of signcryption and sign-then-encrypt schemes for resource-constrained IoT devices

K Molenaar - 2022 - essay.utwente.nl
For resource-constrained devices, the traditional cryptographic schemes are often too
heavy. Therefore, signcryption was invented. Signcryption performs signing and encryption …