AR Sfar, E Natalizio, Y Challal, Z Chtourou - Digital Communications and …, 2018 - Elsevier
Unquestionably, communicating entities (object, or things) in the Internet of Things (IoT) context are playing an active role in human activities, systems and processes. The high …
The design of ultralightweight authentication protocols that conform to low-cost tag requirements is imperative. This paper analyses the most important proposals (except for …
P Zhang, P Hu, V Pasikanti, D Ganesan - Proceedings of the 20th annual …, 2014 - dl.acm.org
This paper argues for a clean-slate redesign of wireless sensor systems to take advantage of the extremely low power consumption of backscatter communication and emerging ultra …
L Xiao, Z Wang - Journal of networks, 2011 - researchgate.net
Constructing an intelligent traffic monitoring system firstly depends on automatic identification for vehicles. At present, automatic identification technology based on image …
Hardware security for an Internet of Things or cyber physical system drives the need for ubiquitous cryptography to different sensing infrastructures in these fields. In particular …
R Doss, S Sundaresan, W Zhou - Ad Hoc Networks, 2013 - Elsevier
In this paper we propose a novel approach to authentication and privacy in mobile RFID systems based on quadratic residues and in conformance to EPC Class-1 Gen-2 …
In the past several years, there has been an increasing trend in the use of Radio Frequency Identification (RFID) and Wireless Sensor Networks (WSNs) as well as in the integration of …
G Jeatsa Kitio, A Djomo Fanda… - Brazilian Journal of …, 2023 - Springer
In this paper, a chaos-based encryption/decryption scheme using a novel memristive Chua oscillator to protect medical images is presented. The novel Chua oscillator is constructed by …
A Review of Cryptographically Secure PRNGs in Constrained Devices for the IoT | SpringerLink Skip to main content Advertisement SpringerLink Account Menu Find a journal Publish with us …