Zobrazeno 1 - 7
of 7
pro vyhledávání: '"Esau Taiwo, Oladipupo"'
Publikováno v:
Applied Sciences, Vol 14, Iss 7, p 2808 (2024)
Cloud computing and the increasing popularity of 5G have greatly increased the application of images on Internet of Things (IoT) devices. The storage of images on an untrusted cloud has high security and privacy risks. Several lightweight cryptosyste
Externí odkaz:
https://doaj.org/article/6e93a7435bf94f2190db5c8836a6b5ae
An Efficient Authenticated Elliptic Curve Cryptography Scheme for Multicore Wireless Sensor Networks
Autor:
Esau Taiwo Oladipupo, Oluwakemi Christiana Abikoye, Agbotiname Lucky Imoize, Joseph Bamidele Awotunde, Ting-Yi Chang, Cheng-Chi Lee, Dinh-Thuan Do
Publikováno v:
IEEE Access, Vol 11, Pp 1306-1323 (2023)
The need to ensure the longevity of Wireless Sensor Networks (WSNs) and secure their communication has spurred various researchers to come up with various WSN models. Prime among the methods for extending the life span of WSNs is the clustering of Wi
Externí odkaz:
https://doaj.org/article/8c914bdb05dd4432876884166726f70e
Autor:
Esau Taiwo, Oladipupo, Christianah, Abikoye Oluwakemi, Oluwatobi, Akande Noah, Aderonke, Kayode Anthonia, kehinde, Adeniyi Jide
Publikováno v:
In Procedia Computer Science 2020 171:2532-2540
Autor:
Oluwakemi Christiana Abikoye, Esau Taiwo Oladipupo, Agbotiname Lucky Imoize, Joseph Bamidele Awotunde, Cheng-Chi Lee, Chun-Ta Li
Publikováno v:
Future Internet, Vol 15, Iss 3, p 99 (2023)
The application of the Internet of Medical Things (IoMT) in medical systems has brought much ease in discharging healthcare services by medical practitioners. However, the security and privacy preservation of critical user data remain the reason the
Externí odkaz:
https://doaj.org/article/a51a992e6ef94c908ff800aa568b3d85
Publikováno v:
Computer Science and Information Technologies. 3:169-185
Elliptic curve cryptography (ECC) remains the best approach to asymmetric cryptography when it comes to securing communication among communication partners in low-computing devices such as wireless sensor networks (WSN) and the Internet of Things (Io
The security of Elliptic Curve Cryptosystem (ECC) hinges on on the hardness of Elliptic Curve Discrete Logic Problem. However, existing mapping schemes are inefficient, make ECC vulnerable to security attacks and cannot be efficiently implemented in
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::2f776bcae7b56f5cdc2a9e6b9a39a944
https://doi.org/10.21203/rs.3.rs-2027423/v1
https://doi.org/10.21203/rs.3.rs-2027423/v1
Playfair is the earliest known classical block cipher which is capable of taking two characters as a unit in the process of encryption and decryption. However, the cipher is suffering from vulnerability to many cryptanalysis attacks due to a lack of
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::ead71a2426f0a1b78c1cc95607725949
https://zenodo.org/record/7935340
https://zenodo.org/record/7935340