A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2018; you can also visit the original URL.
The file type is application/pdf
.
Filters
Password-Hashing Status
2017
Cryptography
As a huge block of memory is allocated to compute the password-hash, it later becomes a "garbage" when the PHS computations are completed. ...
In most of these occasions the user data were stored in clear or were just processed by a cryptographic hash function. ...
A service provider can further enhance security against analysis of stolen data by applying CIU methods in order to periodically fortify the protection level based on the attackers' increasing computational ...
doi:10.3390/cryptography1020010
fatcat:klnw5tucinfwfoxwe5zlpsepwi
An Efficient Data Protection Architecture Based on Fragmentation and Encryption
[article]
2018
arXiv
pre-print
In this thesis, a completely revisited data protection scheme based on selective encryption is presented. ...
First, this new scheme is agnostic in term of data format, second it has a parallel architecture using GPGPU allowing performance to be at least comparable to full encryption algorithms. ...
However, there is a drawback of such an approach: adjacent blocks have data dependencies that can only be avoided by extending all blocks with some rows and columns that overlap with adjacent blocks. ...
arXiv:1803.04880v1
fatcat:vdw64fjyvzd3roqunaz4yu7yua
Advances in Security and Privacy of Multimedia Big Data in Mobile and Cloud Computing
2017
Multimedia tools and applications
Therefore, the papers of this special issue address variety of security and privacy issues of multimedia big data in mobile and cloud computing and security of other aspects of mobile and cloud networks ...
Moreover, the explosion of multimedia big data (image, video, 3D, etc.) in mobile and cloud computing have created unprecedented opportunities and fundamental security and privacy challenges as they are ...
In addition, we are also grateful to all the authors for submitting and improving their papers. ...
doi:10.1007/s11042-017-5301-x
fatcat:jvqg35sg5nhtlm3aurspfdkami
Accelerating Linux and Android applications on low-power devices through remote GPGPU offloading
2017
Concurrency and Computation
RAPID supports CPU and GPGPU computation offloading on Linux and Android devices. Moreover, the framework implements lightweight secure data transmission of the offloading operations. ...
In this paper we describe RAPID, a complete framework suite for computation offloading to help low-powered devices overcome these limitations. ...
Moreover, RAPID implements a lightweight security layer to protect the data transmitted during CPU task offloading from malicious users. ...
doi:10.1002/cpe.4286
fatcat:tfhftarbprbkxam3deakxjxs5m
Multimedia security and privacy protection in the internet of things: research developments and challenges
2022
International Journal of Multimedia Intelligence and Security
In this paper, we conduct a comprehensive survey on multimedia data security and privacy protection in the IoT. ...
The security and privacy of multimedia data have, however, emerged as key challenges that have the potential to impact the successful deployment of IoT devices in some data-sensitive applications. ...
block-based logic operations to cut down biometric feature sizes in a simple yet effective way. ...
doi:10.1504/ijmis.2022.10044461
fatcat:xdliezm2kbe3vkrpgnso74xtba
SoC-Based Edge Computing Gateway in the Context of the Internet of Multimedia Things: Experimental Platform
2018
Journal of Low Power Electronics and Applications
A lightweight implementation of the proposed design is obtained by approximate computing of the discrete cosine transform (DCT) and by using a simple chaotic generator which greatly enhances the encryption ...
This paper presents an algorithm/architecture and Hardware/Software co-designs for implementing a digital edge computing layer on a Zynq platform in the context of the Internet of Multimedia Things (IoMT ...
They have developed a part of this work for their tutored project. Maher JRIDI has proposed, developed, and coordinated this project. ...
doi:10.3390/jlpea8010001
fatcat:2wwcc5mswff4xlin7ddt4diyma
A lightweight cryptographic algorithm for the transmission of images from road environments in self-driving
2021
Cybersecurity
with the help of the mobile edge computing. ...
In order to address these two challenges, we propose a security strategy in the edge computing. ...
In this paper, we take a 64-bit block cipher example. ...
doi:10.1186/s42400-020-00066-2
fatcat:zewmqhdkxnh2zmvqiwqgzzgdue
Table of Contents
2021
2021 6th International Conference on Communication and Electronics Systems (ICCES)
in Data Science
A Suresh Rao, B. ...
using Format PreservedRC5 Block Cipher
Algorithm in Credit Card Application
Divy Prakash
775
139
140
141
142
Intrusion Detection System in Software defined Network using Machine Learning ...
doi:10.1109/icces51350.2021.9489068
fatcat:knqe55u645bl5enmtfoxffu57i
Lightweight and High-Performance Data Protection for Edge Network Security
2022
Wireless Communications and Mobile Computing
) to propose a lightweight ARM-FPGA computing architecture for edge network data security protection and acceleration. ...
To strengthen the security of edge network data and reduce network latency, in this paper, we combine an advanced reduced instruction set computing machine (ARM) and a field programmable gate array (FPGA ...
On the other hand, with the rapid development of chip technology, mobile devices integrate ARMs, GPUs, FPGAs, etc., to form a heterogeneous computing platform. ...
doi:10.1155/2022/8458314
doaj:908d40ce5dc84e9390dd5407c06bb6f3
fatcat:4l2zndsmy5bzzanvel2aiaqgge
Secure and Provenance Enhanced Internet of Health Things Framework: A Blockchain Managed Federated Learning Approach
2020
IEEE Access
ACKNOWLEDGMENT The authors extend their appreciation to the Deputyship for Research & Innovation, "Ministry of Education "in Saudi ...
Blockchain-based smart meter data provenance and a lightweight hash-based security algorithm were proposed in [73] to detect meter data tampering. ...
data on the mobile device private. ...
doi:10.1109/access.2020.3037474
fatcat:6il44yktnjd4pak2y2rzlnvjdm
Field Programmable Gate Array Applications—A Scientometric Review
2019
Computation
, digital signal processing, image and video processing, big data, computer algorithms and other applications. ...
This paper reviews the top FPGAs' applications by a scientometric analysis in ScientoPy, covering publications related to FPGAs from 1992 to 2018. ...
Khudra: A New Lightweight Block Cipher for FPGAs. ...
doi:10.3390/computation7040063
fatcat:wxtatzsvvnfopghdfl25hcfc2a
An Overview on Edge Computing Research
2020
IEEE Access
At the edge of the network, it is lightweight for local, small-scale data storage and processing. This article mainly reviews the related research and results of edge computing. ...
It is a new computing paradigm for performing calculations at the edge of the network. Unlike cloud computing, it emphasizes closer to the user and closer to the source of the data. ...
Data security and privacy protection in edge computing faces four new challenges: (1) New requirements for lightweight data encryption and fine-grained data sharing based on multiple authorized parties ...
doi:10.1109/access.2020.2991734
fatcat:6gt7kr44urdcfcq65w7m2anjku
2020 Index IEEE Internet of Things Journal Vol. 7
2020
IEEE Internet of Things Journal
., Rateless-Code-Based Secure Cooperative Transmission Scheme for Industrial IoT; JIoT July 2020 6550-6565 Jamalipour, A., see Murali, S., JIoT Jan. 2020 379-388 James, L.A., see Wanasinghe, T.R., ...
Eldosouky, A., +, JIoT April 2020 2840-2854 Privacy Protection Based on Stream Cipher for Spatiotemporal Data in IoT. ...
., +, JIoT April 2020 2968-2981 Privacy Protection Based on Stream Cipher for Spatiotemporal Data in IoT. ...
doi:10.1109/jiot.2020.3046055
fatcat:wpyblbhkrbcyxpnajhiz5pj74a
Deep Learning in Mobile and Wireless Networking: A Survey
2019
IEEE Communications Surveys and Tutorials
In this paper we bridge the gap between deep learning and mobile and wireless networking research, by presenting a comprehensive survey of the crossovers between the two areas. ...
One potential solution is to resort to advanced machine learning techniques, in order to help manage the rise in data volumes and algorithm-driven applications. ...
Fog Computing The fog computing paradigm presents a new opportunity to implement deep learning in mobile systems. ...
doi:10.1109/comst.2019.2904897
fatcat:xmmrndjbsfdetpa5ef5e3v4xda
Deep Learning in Mobile and Wireless Networking: A Survey
[article]
2019
arXiv
pre-print
In this paper we bridge the gap between deep learning and mobile and wireless networking research, by presenting a comprehensive survey of the crossovers between the two areas. ...
One potential solution is to resort to advanced machine learning techniques to help managing the rise in data volumes and algorithm-driven applications. ...
Fog Computing The fog computing paradigm presents a new opportunity to implement deep learning in mobile systems. ...
arXiv:1803.04311v3
fatcat:awuvyviarvbr5kd5ilqndpfsde
« Previous
Showing results 1 — 15 out of 97 results