A review on lightweight cryptography for Internet-of-Things based applications

V Rao, KV Prema - Journal of Ambient Intelligence and Humanized …, 2021 - Springer
Abstract The Internet-of-Things (IoT) is a combination of an intelligent infrastructure
combined with various self-organizing devices. These devices are used to monitor the …

Web3: Exploring Decentralized Technologies and Applications for the Future of Empowerment and Ownership

Y Lai, J Yang, M Liu, Y Li, S Li - Blockchains, 2023 - mdpi.com
The emergence of the World Wide Web has revolutionized online communication, aiming to
achieve global information sharing and communication. However, the current Web 2.0 …

Light-weight hashing method for user authentication in Internet-of-Things

V Rao, KV Prema - Ad Hoc Networks, 2019 - Elsevier
The goal of Internet-of-Things (IoT) is that every object across the globe be interconnected
under the Internet Infrastructure. IoT is expanding its application domain to range from …

Certificateless signature schemes in Industrial Internet of Things: A comparative survey

S Hussain, SS Ullah, I Ali, J Xie, VN Inukollu - Computer Communications, 2022 - Elsevier
Abstract Internet of Things (IoT), which is a growing domain, provides a universal connection
to the Internet by spinning common objects to connected ones by changing the way people …

Combining smart construction objects–enabled blockchain oracles and signature techniques to ensure information authentication and integrity in construction

W Lu, J Lou, L Wu - Journal of Computing in Civil Engineering, 2023 - ascelibrary.org
Reliable and accurate information is crucial for decision making in construction projects.
However, stakeholders driven by profit have the potential to manipulate information …

Smart delivery of multifaceted services through connected governance

A Roy - 2019 3rd International Conference on Computing …, 2019 - ieeexplore.ieee.org
Advancement of Information and Communication Technology have enabled delivery of
electronic communication services to the doorstep of Citizen. To deliver these …

QS-Auth: A Quantum-secure mutual authentication protocol based on PUF and Post-Quantum Signature for Heterogeneous Delay-Tolerant Networks

MM Mathews, V Panchami - Journal of Information Security and …, 2024 - Elsevier
Delay tolerant networks supporting heterogeneous communication are a promising network
architecture solution that can meet today's communication requirements involving nodes in …

[PDF][PDF] Digital signature & encryption implementation for increasing authentication, integrity, security and data non-repudiation

I Nurhaida, D Ramayanti, R Riesaputra - Int. Res. J. Comput. Sci, 2017 - academia.edu
A digital signature is a method that serves to improve the integrity, authenticity, non-
repudiation, and confidentiality of digital data in transmission. This paper discusses digital …

[PDF][PDF] Secure digital signature scheme based on elliptic curves for internet of things

S Koppula, J Muthukuru - International Journal of Electrical and …, 2016 - academia.edu
Advances in the info and communication knowledge have led to the emergence of Internet
of things (IoT). Internet of things (loT) is worthwhile to members, trade, and society seeing …

[PDF][PDF] Data modeling for E-voting system using smart card based E-governance system

R Khatun, T Bandopadhyay, A Roy - International Journal of …, 2017 - researchgate.net
For a developing country like India, maintaining an efficient administration within affordable
budget is a big challenge. The application of Information and Communication Technology …