Filters








97 Hits in 8.3 sec

Password-Hashing Status

George Hatzivasilis
2017 Cryptography  
As a huge block of memory is allocated to compute the password-hash, it later becomes a "garbage" when the PHS computations are completed.  ...  In most of these occasions the user data were stored in clear or were just processed by a cryptographic hash function.  ...  A service provider can further enhance security against analysis of stolen data by applying CIU methods in order to periodically fortify the protection level based on the attackers' increasing computational  ... 
doi:10.3390/cryptography1020010 fatcat:klnw5tucinfwfoxwe5zlpsepwi

An Efficient Data Protection Architecture Based on Fragmentation and Encryption [article]

Han Qiu
2018 arXiv   pre-print
In this thesis, a completely revisited data protection scheme based on selective encryption is presented.  ...  First, this new scheme is agnostic in term of data format, second it has a parallel architecture using GPGPU allowing performance to be at least comparable to full encryption algorithms.  ...  However, there is a drawback of such an approach: adjacent blocks have data dependencies that can only be avoided by extending all blocks with some rows and columns that overlap with adjacent blocks.  ... 
arXiv:1803.04880v1 fatcat:vdw64fjyvzd3roqunaz4yu7yua

Advances in Security and Privacy of Multimedia Big Data in Mobile and Cloud Computing

B. B. Gupta, Shingo Yamaguchi, Dharma P. Agrawal
2017 Multimedia tools and applications  
Therefore, the papers of this special issue address variety of security and privacy issues of multimedia big data in mobile and cloud computing and security of other aspects of mobile and cloud networks  ...  Moreover, the explosion of multimedia big data (image, video, 3D, etc.) in mobile and cloud computing have created unprecedented opportunities and fundamental security and privacy challenges as they are  ...  In addition, we are also grateful to all the authors for submitting and improving their papers.  ... 
doi:10.1007/s11042-017-5301-x fatcat:jvqg35sg5nhtlm3aurspfdkami

Accelerating Linux and Android applications on low-power devices through remote GPGPU offloading

Raffaele Montella, Sokol Kosta, David Oro, Javier Vera, Carles Fernández, Carlo Palmieri, Diana Di Luccio, Giulio Giunta, Marco Lapegna, Giuliano Laccetti
2017 Concurrency and Computation  
RAPID supports CPU and GPGPU computation offloading on Linux and Android devices. Moreover, the framework implements lightweight secure data transmission of the offloading operations.  ...  In this paper we describe RAPID, a complete framework suite for computation offloading to help low-powered devices overcome these limitations.  ...  Moreover, RAPID implements a lightweight security layer to protect the data transmitted during CPU task offloading from malicious users.  ... 
doi:10.1002/cpe.4286 fatcat:tfhftarbprbkxam3deakxjxs5m

Multimedia security and privacy protection in the internet of things: research developments and challenges

Jiankun Hu, Nickson M. Karie, Song Wang, Wencheng Yang
2022 International Journal of Multimedia Intelligence and Security  
In this paper, we conduct a comprehensive survey on multimedia data security and privacy protection in the IoT.  ...  The security and privacy of multimedia data have, however, emerged as key challenges that have the potential to impact the successful deployment of IoT devices in some data-sensitive applications.  ...  block-based logic operations to cut down biometric feature sizes in a simple yet effective way.  ... 
doi:10.1504/ijmis.2022.10044461 fatcat:xdliezm2kbe3vkrpgnso74xtba

SoC-Based Edge Computing Gateway in the Context of the Internet of Multimedia Things: Experimental Platform

Maher Jridi, Thibault Chapel, Victor Dorez, Guénolé Le Bougeant, Antoine Le Botlan
2018 Journal of Low Power Electronics and Applications  
A lightweight implementation of the proposed design is obtained by approximate computing of the discrete cosine transform (DCT) and by using a simple chaotic generator which greatly enhances the encryption  ...  This paper presents an algorithm/architecture and Hardware/Software co-designs for implementing a digital edge computing layer on a Zynq platform in the context of the Internet of Multimedia Things (IoMT  ...  They have developed a part of this work for their tutored project. Maher JRIDI has proposed, developed, and coordinated this project.  ... 
doi:10.3390/jlpea8010001 fatcat:2wwcc5mswff4xlin7ddt4diyma

A lightweight cryptographic algorithm for the transmission of images from road environments in self-driving

Runchen Gao, Shen Li, Yuqi Gao, Rui Guo
2021 Cybersecurity  
with the help of the mobile edge computing.  ...  In order to address these two challenges, we propose a security strategy in the edge computing.  ...  In this paper, we take a 64-bit block cipher example.  ... 
doi:10.1186/s42400-020-00066-2 fatcat:zewmqhdkxnh2zmvqiwqgzzgdue

Table of Contents

2021 2021 6th International Conference on Communication and Electronics Systems (ICCES)  
in Data Science A Suresh Rao, B.  ...  using Format PreservedRC5 Block Cipher Algorithm in Credit Card Application Divy Prakash 775 139 140 141 142 Intrusion Detection System in Software defined Network using Machine Learning  ... 
doi:10.1109/icces51350.2021.9489068 fatcat:knqe55u645bl5enmtfoxffu57i

Lightweight and High-Performance Data Protection for Edge Network Security

Xiaojie Chen, Bin Li, Qinglei Zhou
2022 Wireless Communications and Mobile Computing  
) to propose a lightweight ARM-FPGA computing architecture for edge network data security protection and acceleration.  ...  To strengthen the security of edge network data and reduce network latency, in this paper, we combine an advanced reduced instruction set computing machine (ARM) and a field programmable gate array (FPGA  ...  On the other hand, with the rapid development of chip technology, mobile devices integrate ARMs, GPUs, FPGAs, etc., to form a heterogeneous computing platform.  ... 
doi:10.1155/2022/8458314 doaj:908d40ce5dc84e9390dd5407c06bb6f3 fatcat:4l2zndsmy5bzzanvel2aiaqgge

Secure and Provenance Enhanced Internet of Health Things Framework: A Blockchain Managed Federated Learning Approach

Md. Abdur Rahman, M. Shamim Hossain, M. Saiful Islam, Nabil A. Alrajeh, Ghulam Muhammad
2020 IEEE Access  
ACKNOWLEDGMENT The authors extend their appreciation to the Deputyship for Research & Innovation, "Ministry of Education "in Saudi  ...  Blockchain-based smart meter data provenance and a lightweight hash-based security algorithm were proposed in [73] to detect meter data tampering.  ...  data on the mobile device private.  ... 
doi:10.1109/access.2020.3037474 fatcat:6il44yktnjd4pak2y2rzlnvjdm

Field Programmable Gate Array Applications—A Scientometric Review

Juan Ruiz-Rosero, Gustavo Ramirez-Gonzalez, Rahul Khanna
2019 Computation  
, digital signal processing, image and video processing, big data, computer algorithms and other applications.  ...  This paper reviews the top FPGAs' applications by a scientometric analysis in ScientoPy, covering publications related to FPGAs from 1992 to 2018.  ...  Khudra: A New Lightweight Block Cipher for FPGAs.  ... 
doi:10.3390/computation7040063 fatcat:wxtatzsvvnfopghdfl25hcfc2a

An Overview on Edge Computing Research

Keyan Cao, Yefan Liu, Gongjie Meng, Qimeng Sun
2020 IEEE Access  
At the edge of the network, it is lightweight for local, small-scale data storage and processing. This article mainly reviews the related research and results of edge computing.  ...  It is a new computing paradigm for performing calculations at the edge of the network. Unlike cloud computing, it emphasizes closer to the user and closer to the source of the data.  ...  Data security and privacy protection in edge computing faces four new challenges: (1) New requirements for lightweight data encryption and fine-grained data sharing based on multiple authorized parties  ... 
doi:10.1109/access.2020.2991734 fatcat:6gt7kr44urdcfcq65w7m2anjku

2020 Index IEEE Internet of Things Journal Vol. 7

2020 IEEE Internet of Things Journal  
., Rateless-Code-Based Secure Cooperative Transmission Scheme for Industrial IoT; JIoT July 2020 6550-6565 Jamalipour, A., see Murali, S., JIoT Jan. 2020 379-388 James, L.A., see Wanasinghe, T.R.,  ...  Eldosouky, A., +, JIoT April 2020 2840-2854 Privacy Protection Based on Stream Cipher for Spatiotemporal Data in IoT.  ...  ., +, JIoT April 2020 2968-2981 Privacy Protection Based on Stream Cipher for Spatiotemporal Data in IoT.  ... 
doi:10.1109/jiot.2020.3046055 fatcat:wpyblbhkrbcyxpnajhiz5pj74a

Deep Learning in Mobile and Wireless Networking: A Survey

Chaoyun Zhang, Paul Patras, Hamed Haddadi
2019 IEEE Communications Surveys and Tutorials  
In this paper we bridge the gap between deep learning and mobile and wireless networking research, by presenting a comprehensive survey of the crossovers between the two areas.  ...  One potential solution is to resort to advanced machine learning techniques, in order to help manage the rise in data volumes and algorithm-driven applications.  ...  Fog Computing The fog computing paradigm presents a new opportunity to implement deep learning in mobile systems.  ... 
doi:10.1109/comst.2019.2904897 fatcat:xmmrndjbsfdetpa5ef5e3v4xda

Deep Learning in Mobile and Wireless Networking: A Survey [article]

Chaoyun Zhang, Paul Patras, Hamed Haddadi
2019 arXiv   pre-print
In this paper we bridge the gap between deep learning and mobile and wireless networking research, by presenting a comprehensive survey of the crossovers between the two areas.  ...  One potential solution is to resort to advanced machine learning techniques to help managing the rise in data volumes and algorithm-driven applications.  ...  Fog Computing The fog computing paradigm presents a new opportunity to implement deep learning in mobile systems.  ... 
arXiv:1803.04311v3 fatcat:awuvyviarvbr5kd5ilqndpfsde
« Previous Showing results 1 — 15 out of 97 results