Browse
Publications
Preprints
About
About UCL Open: Env.
Aims and Scope
Editorial Board
Indexing
APCs
How to cite
Publishing policies
Editorial policy
Peer review policy
Equality, Diversity & Inclusion
About UCL Press
Contact us
For authors
Information for authors
How it works
Benefits of publishing with us
Submit
How to submit
Preparing your manuscript
Article types
Open Data
ORCID
APCs
Contributor agreement
For reviewers
Information for reviewers
Review process
How to peer review
Peer review policy
My ScienceOpen
Sign in
Register
Dashboard
Search
Browse
Publications
Preprints
About
About UCL Open: Env.
Aims and Scope
Editorial Board
Indexing
APCs
How to cite
Publishing policies
Editorial policy
Peer review policy
Equality, Diversity & Inclusion
About UCL Press
Contact us
For authors
Information for authors
How it works
Benefits of publishing with us
Submit
How to submit
Preparing your manuscript
Article types
Open Data
ORCID
APCs
Contributor agreement
For reviewers
Information for reviewers
Review process
How to peer review
Peer review policy
My ScienceOpen
Sign in
Register
Dashboard
Search
9
views
40
references
Top references
cited by
0
Cite as...
0 reviews
Review
0
comments
Comment
0
recommends
+1
Recommend
0
collections
Add to
0
shares
Share
Twitter
Sina Weibo
Facebook
Email
1,194
similar
All similar
Record
: found
Abstract
: not found
Book Chapter
: not found
IoT Based Control Networks and Intelligent Systems : Proceedings of 3rd ICICNIS 2022
Lightweight Block Cipher for Resource Constrained IoT Environment—An Survey, Performance, Cryptanalysis and Research Challenges
other
Author(s):
M. Abinaya
,
S. Prabakeran
Publication date
(Online):
October 12 2022
Publisher:
Springer Nature Singapore
Read this book at
Publisher
Buy book
Review
Review book
Invite someone to review
Bookmark
Cite as...
There is no author summary for this book yet. Authors can add summaries to their books on ScienceOpen to make them more accessible to a non-specialist audience.
Related collections
Resource Identification
Most cited references
40
Record
: found
Abstract
: not found
Article
: not found
A Survey on IoT Security: Application Areas, Security Threats, and Solution Architectures
Vikas Hassija
,
Vinay Chamola
,
Vikas Saxena
…
(2019)
0
comments
Cited
149
times
– based on
0
reviews
Review now
Bookmark
Record
: found
Abstract
: not found
Article
: not found
Demystifying IoT Security: An Exhaustive Survey on IoT Vulnerabilities and a First Empirical Look on Internet-Scale IoT Exploitations
Nataliia Neshenko
,
Elias Bou-Harb
,
Jorge Crichigno
…
(2020)
0
comments
Cited
85
times
– based on
0
reviews
Review now
Bookmark
Record
: found
Abstract
: not found
Article
: not found
The Effect of IoT New Features on Security and Privacy: New Threats, Existing Solutions, and Challenges Yet to Be Solved
Wei Zhou
,
Yan Jia
,
Anni Peng
…
(2018)
0
comments
Cited
60
times
– based on
0
reviews
Review now
Bookmark
All references
Author and book information
Book Chapter
Publication date (Print):
2023
Publication date (Online):
October 12 2022
Pages
: 347-365
DOI:
10.1007/978-981-19-5845-8_25
SO-VID:
1670eb0f-739c-423f-a617-5e38cfddf96f
History
Data availability:
Comments
Comment on this book
Sign in to comment
Book chapters
pp. 1
LabVIEW Based Anomaly Detection for Screening Diabetic Retinopathy
pp. 15
Early Stage Parkinson’s Disease Diagnosis and Detection Using K-Nearest Neighbors Algorithm
pp. 27
IoT Crypto Security Communication System
pp. 41
CNN and XGBoost Based Hybrid Model in Classification of Fetal Ultrasound Scan Planes Images in Detection of Congenital Heart Defects
pp. 55
Review on Web Application Based Infant Health Management
pp. 67
IEEE 802.11g Wireless Protocol Standard: Performance Analysis
pp. 81
Optimal Cluster Head Selection Using Vortex Search Algorithm with Deep Learning-Based Multipath Routing in MANET
pp. 99
Secure Wireless Smart Car Door Unlocking System
pp. 113
A Comprehending Deep Learning Approach for Disease Classification
pp. 123
Restaurant Automation Through IoT and NLP Techniques
pp. 139
Comprehensive Assessment of Big Data in Recommendation Systems
pp. 161
Review on Application of Wireless Technology Using IoT
pp. 171
Comparative Study of Conditional Generative Models for ISL Generation
pp. 191
A Novel Approach for Segmenting Coronary Artery from Angiogram Videos
pp. 201
Analysis of Different Cryptographic Algorithms in Cloud-Based Multi-robot Systems
pp. 217
An IoT Based Environment Monitoring & Controlling System for Food Grain Warehouse
pp. 229
Numerical Analysis and ANN Modeling of the Intercooled, Reheat and Regenerative Gas Turbine Cycle
pp. 251
Implementation of IoT Enabled Home Automation System
pp. 265
Scheduled Line of Symmetry Solar Tracker with MPT and IoT
pp. 275
A New Method for Secure Transmission of Medical Images Using Wavelet Transform and Steganography
pp. 287
Deep Learning Based Hand Sign Recognition in the Context of Indian Greetings and Gestures
pp. 299
Pedestrian Detection Using MobileNetV2 Based Mask R-CNN
pp. 319
Localization of Calcifications in Mammograms Using CNN with GAP Layer
pp. 331
Comparative Analysis of Machine Learning and Deep Learning Algorithms for Real-Time Posture Detection to Prevent Sciatica, Kyphosis, Lordosis
pp. 347
Lightweight Block Cipher for Resource Constrained IoT Environment—An Survey, Performance, Cryptanalysis and Research Challenges
pp. 367
Image Classification Using Quantum Machine Learning
pp. 381
An Efficient Algorithm for Multi Class Classification in Deep Neural Network
pp. 395
Lung Cancer Classification System for CT Images using Deep Convolutional Neural Network
pp. 407
Performance Analysis of Machine Learning Algorithms in Heart Diseases Prediction
pp. 425
Fluorescence Microscopic Image Reconstruction Using Variational Autoencoder and CycleGAN
pp. 437
Tomato Leaf Disease Detection Based on Convolutional Neural Network
pp. 453
PDF Steganography Using Hybrid Crypto Encryption Technique
pp. 467
An Efficient Classification Algorithm for Employee Well-Being Prediction Using Deep Learning
pp. 483
UAV-Enabled Supply Chain Architecture for Flood Recovery in Smart Cities
pp. 497
Outlier-Based Sybil Attack Detection in WSN
pp. 519
An Innovative Novel Method of Reducing the Impact of Traffic Jam Using the Vehicular Ad-Hoc Network
pp. 533
Navbot—College Navigation Chatbot Using Deep Neural Network
pp. 547
Heart Problems Diagnosis Using ECG and PCG Signals and a K-Nearest Neighbor Classifier
pp. 561
Deep Convolutional Neural Network for Multi-class Brain Tumor Classification System in MRI Images
pp. 573
Application of the Particle Swarm Algorithm to the Task of Image Segmentation for Remote Sensing of the Earth
pp. 587
Overview of Data Center Link Load Balancing Technology Based on SDN
pp. 603
Wearable Band for Safety in Chemical Industries
pp. 613
A Deep Learning Framework for Social Distance Monitoring and Face Mask Detection
pp. 621
Information Security and Privacy in Smart Cities, Smart Agriculture, Industry 4.0, Smart Medicine, and Smart Healthcare
pp. 637
Virtual Machine and Container Live Migration Algorithms for Energy Optimization of Data Centre in Cloud Environment: A Research Review
pp. 649
Dynamic Shortest Path Routing Algorithm to Reduce Retransmission and Congestion Avoidance for Mobile Nodes in Wireless Sensor Network
pp. 661
A Systematic Review - Attack and Security Issues in FOG Computing
pp. 675
Examination of Water Impurities Using IoT and Machine Learning Techniques
pp. 689
Cache Coherence for Embedded Multi-core System Architectures: A Survey and Challenges
pp. 703
Comparison of Supervised Machine Learning Algorithms for Predicting Employee Performance on Real Time Dataset
pp. 715
A Resilient and Efficient Protocol for Strengthening the Internet of Things Network Performance
pp. 731
Early Identification of Crop Disease Using Deep Convolution Neural Networks
pp. 743
An Error Dependent Enhancement Method for Images Captured in Dense Fog
pp. 757
3D Video QoE Based Adaptation Framework for Future Communication Networks
pp. 769
Improved Lightweight Cryptography Authentication Based Secure Data Transmission in IoT Networks
pp. 781
Modeling and Control of Induction Machine and Drive in the Combined Domain with New Chaotic Gorilla Troop Optimizer
pp. 793
rSense: A Novel Gesture-Based Human Assistive Device
pp. 803
Smart Boosted Model for Behavior-Based Malware Analysis and Detection
pp. 815
Quality Rating Application for Victual Recipes Using Facial Analysis
pp. 831
Survey of Text Document Summarization Based on Ensemble Topic Vector Clustering Model
pp. 849
A Hybrid Approach on Conditional GAN for Portfolio Analysis
pp. 869
An Innovative Solar Power Can Satellite Model Prototype to Perceive the Environmental Data
pp. 885
Artificial Neural Network Based Fault Diagnosing System
pp. 897
Smart Applicatıon for Voice Over Control on Electronic Devices Usıng NodeMCU
Similar content
1,194
The Study and Security Analysis of HC Stream Cipher
Authors:
Kai Chain -
,
Kai Chain
FPGA Implementation of RECTANGLE Block Cipher Architectures
Authors:
Nivedita Shrivastava
,
Bibhudendra Acharya
A survey on lightweight block ciphers
Authors:
PK Kushwaha
,
M Singh
,
P Kumar
See all similar