S Ahmed, T Ahmed - International Journal of Scientific and …, 2022 - repository.uel.ac.uk
Currently, there are billions of IoT devices connected to each other through the internet, and manufacturers and IT engineers are using modern cryptographic tools to protect the …
In the realm of information and communication sciences, the Internet of Things (IoT) is a new technology with sensors in the healthcare sector. Sensors are critical IoT devices that …
SK Sahu, K Mazumdar - Frontiers in Artificial Intelligence, 2024 - frontiersin.org
The rapid proliferation of Internet of Things (IoT) devices across various industries has revolutionized the way we interact with technology. However, this widespread adoption has …
T Goli, Y Kim - International Journal of Networked and Distributed …, 2021 - Springer
The rapid growth of Internet-of-Things (IoT) devices and the large network of interconnected devices pose new security challenges and privacy threats that would put those devices at …
J Li, X Zhang, W Shi - Electronics, 2022 - mdpi.com
In the Internet of Things (IoT) system, data leakage can easily occur due to the differing security of edge devices and the different processing methods of data in the transmission …
Lightweight cryptography is an effective solution for ensuring confidentiality and privacy in resource-constrained environments, particularly in Internet of Things (IoT) systems. These …
Existe uma demanda crescente de novos dispositivos para a área médica, considerando a Internet das Coisas. Este artigo tem como objetivo avaliar de forma experimental uma …
A Abdullah, N Hafeez, A Ur Rehman… - … of Computing and …, 2024 - journals.uob.edu.bh
This work investigates the encryption and decoding strategies for getting ecological sensor telemetry information. The review assesses both symmetric and awry encryption calculations …
S Asare, W Yaokumah, EBB Gyebi… - International Journal of …, 2022 - igi-global.com
Cryptographic algorithms enable secure data communication over public insecure networks. Though they enhance network security, complex cryptographic operations consume …