

Lightweight compression and encryption. Physically unclonable functions for IoT. IEEE Sensors Journal IEEE Sensors Letters IEEE Internet of Things Journal IEEE J-FLEX IEEE J-ISPIN IEEE J-ERM IEEE J-MASS IEEE T-Big Data IEEE TAFE IEEE T-RS Top Search Terms & Most Downloaded Digital Library Subscriptions Set Content Alerts. Secure communications for resource-constrained IoT devices. Lightweight security protocols for chipless RFID in IoT applications. Lightweight IoT encryption - Security in IoT devices by using pseudorandom number generators. Cryptographically secure lightweight pseudorandom number generators.
#Manuscript central iot software#
Randomness in resource-constrained cryptography devices. ACM Transactions on Internet Technology (TOIT) brings together many computing disciplines including computer software engineering, computer programming languages, middleware, database management, security, knowledge discovery and data mining, networking and distributed systems, communications, performance and scalability etc. Performance on lightweight cryptography for IoT. Security hardware randomness for IoT applications. True random number generators for smart card applications. True random number generators for IoT devices. Lightweight reconfigurable pseudorandom number generators. Lightweight pseudorandom number generators. Secure pseudorandom number generators for resource-constrained devices. Pseudorandom number generators for cryptography in IoT applications. Pseudorandom number generators for lightweight encryption. Topics of interest include, but are not limited to, the following: - Pseudorandom number generators for IoT applications. The idea would be to receive research papers that address the various possible approaches. There are several approaches to generate pseudorandom number sequences with cryptographic or steganographic quality, and each of them has advantages and disadvantages. A component of cryptographic and steganographic systems are pseudorandom number generators, which must generate number sequences with the statistical and robustness requirements for use in information security applications. In this context, cryptographic and steganographic systems must be designed, analyzed and implemented based on lightweight algorithms that can be effective when running on IoT devices.

#Manuscript central iot full#
Therefore, hardware and software systems developed for the IoT face significant challenges in maintaining high system connectivity and functionality while preserving information security, as IoT devices have limited capabilities in terms of computing and energy resources. For purposes of qualifying for peer review and consideration for publication, authors must submit a manuscript according to the following guidelines: The manuscript should be submitted with double-spaced pages (one full blank line between lines of type) using a font size of 11 points or larger, having a margin of at least 1 on all sides. This implies demanding requirements to ensure the confidentiality, integrity and authentication of each customer's data. The Internet of Things (IoT) has an increasing development and demands extensive services from the Internet and cloud infrastructure.
