2021
DOI: 10.1007/978-981-33-6393-9_30
|View full text |Cite
|
Sign up to set email alerts
|

Lightweight Authenticated Encryption for Cloud-assisted IoT Applications

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2024
2024
2024
2024

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(2 citation statements)
references
References 12 publications
0
2
0
Order By: Relevance
“…σ p , where P is the input image. The SSIM between images P and C can be found by applying the formula in Equation (11), where D 1 and D 2 are constant to steady division with the feeble denominator.…”
Section: Metrics Used For the Analysis Of The Proposed Algorithmmentioning
confidence: 99%
See 1 more Smart Citation
“…σ p , where P is the input image. The SSIM between images P and C can be found by applying the formula in Equation (11), where D 1 and D 2 are constant to steady division with the feeble denominator.…”
Section: Metrics Used For the Analysis Of The Proposed Algorithmmentioning
confidence: 99%
“…These capabilities, provided by cloud computing to IoT applications, make IoT applicable to almost all works of life [10]. Hence, the integration of IoT and cloud computing technology is referred to as cloud-assisted IoT (CIoT) [11], which was called cloudIoT by the authors of [12].…”
Section: Introductionmentioning
confidence: 99%