An analysis and a comparative study of cryptographic algorithms used on the internet of things (IoT) based on avalanche effect

Ubiquitous computing is already weaving itself around us and it is connecting everything to the network of networks. This interconnection of objects to the internet is new computing paradigm called the Internet of Things (IoT) networks. Many capacity and non-capacity constrained devices, such as sen...

Full description

Bibliographic Details
Main Author: Muthavhine, Khumbelo Difference
Other Authors: Sumbwanyambe, M
Format: Others
Language:en
Published: 2019
Subjects:
Online Access:http://hdl.handle.net/10500/25883