The market of connected devices, IoT devices in particular, is hotter than ever. Today, lightweight IoT devices are used in several sectors, such as smart cities, smart homes, healthcare, and the manufacturing industry.IoT solutions help increase productivity by predictive maintenance and resource management in the industry. Devices with voice interfaces are spreading rapidly in the home automation markets. Hospitals utilize these ``smart'' devices to monitor patients and present diagnostics data, aiding physicians in their work.It is safe to say that we will be surrounded with more and more connected devices. This opens up to potential attacks, where adversaries may try to disrupt critical services or steal sensitive information. To combat...
International audienceIn the Internet of Things (IoT), many strong constraints have to be considered...
The great revolution of technology and its fast growth have led to a cyber space increasingly vulner...
International audienceConventional cryptographic methods are not appropriate for IoT environments du...
The market of connected devices, IoT devices in particular, is hotter than ever. Today, lightweight ...
IoT is becoming more common and popular due to its wide range of applications in various domains. Th...
In the past decade, the Internet of Things (IoT) has emerged and has been of great importance in the...
The main problem in Internet of Things (IoT) security is how to find lightweight cryptosystems that ...
While our conventional cryptography methods, such for AES (encryption), SHA-256 (hashing) and RSA/El...
In the Internet of Things (IoT), many devices are connected and accumulate a sheer amount of data. T...
Lightweight ciphers are defined as symmetric ciphers. They could be categorized into stream and bloc...
Security is an important aspect of healthcare applications that employ Internet of Things (IoT) tech...
The Internet of Things (IoT) allows users to collect sensor data, control devices, and analyze colle...
With the advent of advanced technology, the IoT has made possible the connection of numerous devices...
Data security plays a central role in the design of Internet of Things (IoT). Since most of the "thi...
The Internet of Things is one of the principal trends in information technology nowadays. The main ...
International audienceIn the Internet of Things (IoT), many strong constraints have to be considered...
The great revolution of technology and its fast growth have led to a cyber space increasingly vulner...
International audienceConventional cryptographic methods are not appropriate for IoT environments du...
The market of connected devices, IoT devices in particular, is hotter than ever. Today, lightweight ...
IoT is becoming more common and popular due to its wide range of applications in various domains. Th...
In the past decade, the Internet of Things (IoT) has emerged and has been of great importance in the...
The main problem in Internet of Things (IoT) security is how to find lightweight cryptosystems that ...
While our conventional cryptography methods, such for AES (encryption), SHA-256 (hashing) and RSA/El...
In the Internet of Things (IoT), many devices are connected and accumulate a sheer amount of data. T...
Lightweight ciphers are defined as symmetric ciphers. They could be categorized into stream and bloc...
Security is an important aspect of healthcare applications that employ Internet of Things (IoT) tech...
The Internet of Things (IoT) allows users to collect sensor data, control devices, and analyze colle...
With the advent of advanced technology, the IoT has made possible the connection of numerous devices...
Data security plays a central role in the design of Internet of Things (IoT). Since most of the "thi...
The Internet of Things is one of the principal trends in information technology nowadays. The main ...
International audienceIn the Internet of Things (IoT), many strong constraints have to be considered...
The great revolution of technology and its fast growth have led to a cyber space increasingly vulner...
International audienceConventional cryptographic methods are not appropriate for IoT environments du...