The great revolution of technology and its fast growth have led to a cyber space increasingly vulnerable to cyber-attacks. For this reason, cyber security becomes paramount to protect our cyber space by presenting and implementing important solutions to protect sensitive data from malicious persons. Thereby various measures of protection have been developed and aim to minimize the risks and damages of attacks. Among them, cryptography plays a vital and crucial role in protecting sensitive transmissions and electronic exchanges through complex networks. Numerous scientific studies have emerged with the advent of the cloud and the Internet of Things (IoT); all of them have expressed a strong need for building secure, efficient and fast ...
Conventional cryptographic techniques are inappropriate for resource-constrained applications in th...
The Internet of Things is one of the principal trends in information technology nowadays. The main ...
Data security plays a central role in the design of Internet of Things (IoT). Since most of the "thi...
In the past decade, the Internet of Things (IoT) has emerged and has been of great importance in the...
The emergence of the Internet of Things (IoT) has enabled billions of devices that collect large amo...
SPT-IoT'19 - The Third Workshop on Security, Privacy and Trust in the Internet of ThingsRecently, we...
The emergence of the Internet of Things (IoT) has enabled billions of devices that collect large amo...
While our conventional cryptography methods, such for AES (encryption), SHA-256 (hashing) and RSA/El...
Currently, the Internet of Things (IOT) and 5G technologies have gain huge popularity. The possibili...
The internet connected modern world raises many security and privacy concerns. Cryptography is one o...
In the Internet of Things (IoT), many devices are connected and accumulate a sheer amount of data. T...
The market of connected devices, IoT devices in particular, is hotter than ever. Today, lightweight ...
IoT is becoming more common and popular due to its wide range of applications in various domains. Th...
With the advent of advanced technology, the IoT has made possible the connection of numerous devices...
The Internet of Things (IoT) is the collection of everyday smart devices which connect to the Cloud,...
Conventional cryptographic techniques are inappropriate for resource-constrained applications in th...
The Internet of Things is one of the principal trends in information technology nowadays. The main ...
Data security plays a central role in the design of Internet of Things (IoT). Since most of the "thi...
In the past decade, the Internet of Things (IoT) has emerged and has been of great importance in the...
The emergence of the Internet of Things (IoT) has enabled billions of devices that collect large amo...
SPT-IoT'19 - The Third Workshop on Security, Privacy and Trust in the Internet of ThingsRecently, we...
The emergence of the Internet of Things (IoT) has enabled billions of devices that collect large amo...
While our conventional cryptography methods, such for AES (encryption), SHA-256 (hashing) and RSA/El...
Currently, the Internet of Things (IOT) and 5G technologies have gain huge popularity. The possibili...
The internet connected modern world raises many security and privacy concerns. Cryptography is one o...
In the Internet of Things (IoT), many devices are connected and accumulate a sheer amount of data. T...
The market of connected devices, IoT devices in particular, is hotter than ever. Today, lightweight ...
IoT is becoming more common and popular due to its wide range of applications in various domains. Th...
With the advent of advanced technology, the IoT has made possible the connection of numerous devices...
The Internet of Things (IoT) is the collection of everyday smart devices which connect to the Cloud,...
Conventional cryptographic techniques are inappropriate for resource-constrained applications in th...
The Internet of Things is one of the principal trends in information technology nowadays. The main ...
Data security plays a central role in the design of Internet of Things (IoT). Since most of the "thi...