Search
Now showing items 1-7 of 7
Leveraging utilization as performance metric for CDN enabled energy efficient internet of things
(
Elsevier B.V.
, 2019 , Article)
The exponential increase in the Internet of Things (IoT) has drastically augmented the need for computing and storage resources. IoT devices generate massive data that requires to be efficiently stored and disseminated for ...
Key Generation Based Fuzzy Logic and Elliptic Curve Cryptography for Internet of Things (IoT) Authentication
(
Institute of Electrical and Electronics Engineers Inc.
, 2020 , Conference Paper)
The security and privacy of the network in the Internet of Things is playing an important challenge for researchers and engineers. Considering that packets are exchanged between the end user and the sensing devices, it is ...
Multi-layer security scheme for implantable medical devices
(
Springer
, 2020 , Article)
Internet of Medical Things (IoMTs) is fast emerging, thereby fostering rapid advances in the areas of sensing, actuation and connectivity to significantly improve the quality and accessibility of health care for everyone. ...
A Survey of Machine and Deep Learning Methods for Internet of Things (IoT) Security
(
Institute of Electrical and Electronics Engineers Inc.
, 2020 , Article)
The Internet of Things (IoT) integrates billions of smart devices that can communicate with one another with minimal human intervention. IoT is one of the fastest developing fields in the history of computing, with an ...
LAMANCO: A lightweight anonymous mutual authentication scheme for n -times computing offloading in IoT
(
Institute of Electrical and Electronics Engineers Inc.
, 2019 , Article)
Nowadays in many application scenarios of Internet of Things (IoT), low latency is achieved at the cost of computing-complexity which is beyond the capabilities of IoT devices. Offloading the computing intensive tasks to ...
Fuzzy Elliptic Curve Cryptography for Authentication in Internet of Things
(
Institute of Electrical and Electronics Engineers Inc.
, 2021 , Article)
The security and privacy of the network in Internet of Things (IoT) systems are becoming more critical as we are still more dependent on smart systems. Considering that packets are exchanged between the end user and the ...
Salt Generation for Hashing Schemes based on ECG readings for Emergency Access to Implantable Medical Devices
(
Institute of Electrical and Electronics Engineers Inc.
, 2018 , Conference Paper)
Secure communication in medical devices is a pillar in ensuring patient's safety. However, in emergency cases, this can hinder the recovery of the patient. If an emergency team cannot give themselves access to the IMD ...