An analysis and a comparative study of cryptographic algorithms used on the internet of things (IoT) based on avalanche effect
Ubiquitous computing is already weaving itself around us and it is connecting everything to the network of networks. This interconnection of objects to the internet is new computing paradigm called the Internet of Things (IoT) networks. Many capacity and non-capacity constrained devices, such as sen...
Main Author: | |
---|---|
Other Authors: | |
Format: | Others |
Language: | en |
Published: |
2019
|
Subjects: | |
Online Access: | http://hdl.handle.net/10500/25883 |