Asset Details
MbrlCatalogueTitleDetail
Do you wish to reserve the book?
Lattice-based cryptosystems for the security of resource-constrained IoT devices in post-quantum world: a survey
by
Nguyen, Tu N.
, Akleylek, Sedat
, Cengiz, Korhan
, Seyhan, Kübra
in
Algorithms
/ Classification
/ Communication
/ Computer Communication Networks
/ Computer Science
/ Computer systems
/ Cryptography
/ Cybersecurity
/ Energy consumption
/ Internet of Things
/ Operating Systems
/ Personal computers
/ Processor Architectures
/ Product life cycle
/ Quantum computing
/ Quantum cryptography
2022
Hey, we have placed the reservation for you!
By the way, why not check out events that you can attend while you pick your title.
You are currently in the queue to collect this book. You will be notified once it is your turn to collect the book.
Oops! Something went wrong.
Looks like we were not able to place the reservation. Kindly try again later.
Are you sure you want to remove the book from the shelf?
Lattice-based cryptosystems for the security of resource-constrained IoT devices in post-quantum world: a survey
by
Nguyen, Tu N.
, Akleylek, Sedat
, Cengiz, Korhan
, Seyhan, Kübra
in
Algorithms
/ Classification
/ Communication
/ Computer Communication Networks
/ Computer Science
/ Computer systems
/ Cryptography
/ Cybersecurity
/ Energy consumption
/ Internet of Things
/ Operating Systems
/ Personal computers
/ Processor Architectures
/ Product life cycle
/ Quantum computing
/ Quantum cryptography
2022
Oops! Something went wrong.
While trying to remove the title from your shelf something went wrong :( Kindly try again later!
Do you wish to request the book?
Lattice-based cryptosystems for the security of resource-constrained IoT devices in post-quantum world: a survey
by
Nguyen, Tu N.
, Akleylek, Sedat
, Cengiz, Korhan
, Seyhan, Kübra
in
Algorithms
/ Classification
/ Communication
/ Computer Communication Networks
/ Computer Science
/ Computer systems
/ Cryptography
/ Cybersecurity
/ Energy consumption
/ Internet of Things
/ Operating Systems
/ Personal computers
/ Processor Architectures
/ Product life cycle
/ Quantum computing
/ Quantum cryptography
2022
Please be aware that the book you have requested cannot be checked out. If you would like to checkout this book, you can reserve another copy
We have requested the book for you!
Your request is successful and it will be processed during the Library working hours. Please check the status of your request in My Requests.
Oops! Something went wrong.
Looks like we were not able to place your request. Kindly try again later.
Lattice-based cryptosystems for the security of resource-constrained IoT devices in post-quantum world: a survey
Journal Article
Lattice-based cryptosystems for the security of resource-constrained IoT devices in post-quantum world: a survey
2022
Request Book From Autostore
and Choose the Collection Method
Overview
The concept of the Internet of Things (IoT) arises due to the change in the characteristics and numbers of smart devices. Communication of things makes it important to ensure security in this interactive architecture. One of the developments that are subject to change in IoT environments is post-quantum cryptography. This evolution, which includes the change of asymmetric cryptosystems, affects the security of IoT devices. In this paper, fundamental characteristics and layered architecture of IoT environments are examined. Basic security requirements and solution technologies for IoT architecture are remembered. Some important open problems in the literature for IoT device security are recalled. From these open problems, the post-quantum security of IoT devices with limited resources is focused. The main purpose of this paper is to improve the constrained resource classification and give a point of view for post-quantum IoT security. In this context, a sensitive classification is proposed by improving the limited resource classification of IETF. The cryptosystem efficiency definition is made for the analysis of resource-constrained device security. Using the proposed classification and efficiency definition, the usage of lattice-based cryptosystems in resource-constrained IoT device security is analyzed.
Publisher
Springer US,Springer Nature B.V
Subject
This website uses cookies to ensure you get the best experience on our website.