Search

  • Select Article Type
  • Abstract Supplements
  • Blood Group Review
  • Call to Arms
  • Hypothesis
  • In Memoriam
  • Interview
  • Introduction
  • Short Report
  • abstract
  • Abstracts
  • Article
  • book-review
  • case-report
  • case-study
  • Clinical Practice
  • Commentary
  • Conference Presentation
  • conference-report
  • congress-report
  • Correction
  • Editorial
  • Editorial Comment
  • Erratum
  • Events
  • Letter
  • Letter to Editor
  • mini-review
  • minireview
  • News
  • non-scientific
  • Obituary
  • original-paper
  • Original Research
  • Pictorial Review
  • Position Paper
  • Practice Report
  • Preface
  • Preliminary report
  • Product Review
  • rapid-communication
  • Report
  • research-article
  • Research Communicate
  • research-paper
  • Research Report
  • Review
  • review -article
  • review-article
  • Review Paper
  • Sampling Methods
  • Scientific Commentary
  • short-communication
  • short-report
  • Student Essay
  • Varia
  • Welome
  • Select Journal
  • In Jour Smart Sensing And Intelligent Systems

 

Research Article

Secure Hash Algorithm-3(SHA-3) implementation on Xilinx FPGAs, Suitable for IoT Applications

Data integrity is a term used when referring to the accuracy and reliability of data. It ensures that data is not altered during operations, such as transfer, storage, or retrieval. Any changes to the data for example malicious intention, unpredicted hardware failure or human error would results in failure of data integrity. Cryptographic hash functions are generally used for the verification of data integrity. For many Internet of Things (IoT) applications, hardware implementations of

Muzaffar Rao, Thomas Newe, Ian Grout

International Journal on Smart Sensing and Intelligent Systems , ISSUE 5, 1–6

Article

IOT-1-PASS-SECURITY: 1(ONE)-PASS AUTHENTICATED KEY AGREEMENT PROTOCOL FOR ENERGY CONSTRAINT IOT APPLICATIONS

IoT data security is one of the core unresolved challenges in IoT community. Lack of resource-efficient authenticated secure key exchange methods among resource- constrained IoT devices makes man-in-the-middle attacks a serious vulnerability. In this regard, we propose 1(One) pass Authenticated Key Agreement (AKA) protocol for IoT applications. This protocol requires only one round of communication among the sender and receiver to establish a secure session, providing a balance between security

Mehrdad Aliasgari, Garrett Chan, Mohammad Mozumdar

International Journal on Smart Sensing and Intelligent Systems , ISSUE 2, 598–615

Research Article

Technical Features and Functionalities of Myo Armband: An Overview on Related Literature and Advanced Applications of Myoelectric Armbands Mainly Focused on Arm Prostheses

P. Visconti, F. Gaetani, G.A. Zappatore, P. Primiceri

International Journal on Smart Sensing and Intelligent Systems , ISSUE 1, 1–25

Research Article

FEATURES, OPERATION PRINCIPLE AND LIMITS OF SPI
AND I2C COMMUNICATION PROTOCOLS FOR SMART OBJECTS: A NOVEL SPI-BASED HYBRID PROTOCOL
ESPECIALLY SUITABLE FOR IoT APPLICATIONS

P. Visconti, G. Giannotta, R. Brama, P. Primiceri, A. Malvasi, A. Centuori

International Journal on Smart Sensing and Intelligent Systems , ISSUE 2, 262–295

No Record Found..
Page Actions