Embedded devices security: design and implementation of a light RDBMS encryption utilizing multi-core processors
The pervasive proliferation of embedded, mobile, and IoT devices continue to change our lifestyle dramatically. However, the huge increase in these devices has come with critical breaches to data resting inside them. Many types of such data are considered to be sensitive and confidential. Because th...
| Main Authors: | Alomari, Mohammad Ahmed, Aris, Hazleen, Ghaleb, Mukhtar, Almurtadha, Yahya, Alkawsi, Gamal Abdulnaser, Al-Hadi, Ismail Ahmad Al-Qasem, Baashar, Yahia, Samsudin, Khairulmizam |
|---|---|
| Format: | Article |
| Published: |
Institute of Electrical and Electronics Engineers
2023
|
| Online Access: | http://psasir.upm.edu.my/id/eprint/107654/ |
Similar Items
Light database encryption design utilizing multicore processors for mobile devices
by: Alomari, Mohammad Ahmed, et al.
Published: (2019)
by: Alomari, Mohammad Ahmed, et al.
Published: (2019)
The development of a commercially viable database encryption tool for Oracle8i Rdbms
by: Kama, Mohd. Nazri, et al.
Published: (2005)
by: Kama, Mohd. Nazri, et al.
Published: (2005)
Embedded processor security
by: d'Auriol, Brian J., et al.
Published: (2007)
by: d'Auriol, Brian J., et al.
Published: (2007)
A framework for GPU-accelerated AES-XTS encryption in mobile devices
by: Alomari, Mohammad Ahmed, et al.
Published: (2011)
by: Alomari, Mohammad Ahmed, et al.
Published: (2011)
An embedded database design and implementation of a parallel IEEE XTS storage encryption for mobile devices
by: Alomari, Mohammad Ahmed Mohammad
Published: (2017)
by: Alomari, Mohammad Ahmed Mohammad
Published: (2017)
Design of an advanced encryption standard crypto-processor core for field programmable gate array implementation
by: Ismail, Mohd. Izuan
Published: (2006)
by: Ismail, Mohd. Izuan
Published: (2006)
A parallel XTS encryption mode of operation
by: Alomari, Mohammad Ahmed, et al.
Published: (2009)
by: Alomari, Mohammad Ahmed, et al.
Published: (2009)
Implementation of a parallel XTS encryption mode of operation
by: Alomari, Mohammad Ahmed, et al.
Published: (2014)
by: Alomari, Mohammad Ahmed, et al.
Published: (2014)
RISC Design: Synthesis Of The MIPS Processor Core
by: Yew, Teong Guan
Published: (2003)
by: Yew, Teong Guan
Published: (2003)
USB soft core with altera Nios processor
by: Cheah, Chee Teong
Published: (2007)
by: Cheah, Chee Teong
Published: (2007)
Development Of An 8-Bit Fpga-Based Asynchronous Risc Pipelined Processor For Data Encryption
by: Pang, Wai Leong
Published: (2003)
by: Pang, Wai Leong
Published: (2003)
Implementation of a soft core processor on a FPGA
by: Woo, Chi Liang
Published: (2011)
by: Woo, Chi Liang
Published: (2011)
A new power efficient high performance interconnection network for many-core processors
by: Al Faisal, Faiz, et al.
Published: (2017)
by: Al Faisal, Faiz, et al.
Published: (2017)
Verilog design of a 256-bit AES crypto processor core
by: Lai, Yit Pin
Published: (2007)
by: Lai, Yit Pin
Published: (2007)
Design of an iris verification system on embedded blackfin processor for access control application
by: Ng, Richard Yew Fatt
Published: (2012)
by: Ng, Richard Yew Fatt
Published: (2012)
Single core hardware module to implement encryption in TECB mode
by: Reaz, M. B. I., et al.
Published: (2007)
by: Reaz, M. B. I., et al.
Published: (2007)
Single core hardware module to implement encryption in TECB mode
by: Reaz, Mamun Bin Ibne, et al.
Published: (2007)
by: Reaz, Mamun Bin Ibne, et al.
Published: (2007)
An analysis of the AAḃ asymmetric encryption scheme on embedded devices for IoT environment / Syed Farid Syed Adnan
by: Syed Adnan, Syed Farid
Published: (2019)
by: Syed Adnan, Syed Farid
Published: (2019)
MPI communication benchmarking on Intel Xeon dual quad-core processor cluster
by: Ismail, Roswan, et al.
Published: (2011)
by: Ismail, Roswan, et al.
Published: (2011)
An embedded processing of differential pulse voltammetry (DPV) data using ARM processor (LPC1768)
by: Mazaheri, Amin, et al.
Published: (2015)
by: Mazaheri, Amin, et al.
Published: (2015)
A hardware implementation of Rivest-Shamir-Adleman co-processor for resource constrained embedded systems
by: Paniandi, Arul
Published: (2006)
by: Paniandi, Arul
Published: (2006)
Real-time high-resolution downsampling algorithm on many-core processor for spatially scalable video coding
by: Buhari, A., et al.
Published: (2015)
by: Buhari, A., et al.
Published: (2015)
Optical encryption device for software protection
by: Ehsan, Abang Annuar, et al.
Published: (2016)
by: Ehsan, Abang Annuar, et al.
Published: (2016)
Security Study and Encryption / Decryption Method
by: Al-Qdah, Majdi Taysir
Published: (2000)
by: Al-Qdah, Majdi Taysir
Published: (2000)
Power optimization in multi-processor system with frequency scaling and processor affinity
by: Wee, Adrian Siong Min
Published: (2010)
by: Wee, Adrian Siong Min
Published: (2010)
Design of Asynchronous Processor
by: Puah, Wei Boo
Published: (2001)
by: Puah, Wei Boo
Published: (2001)
Data Encryption Standard (DES)
by: Alshaikhli, Imad Fakhri Taha, et al.
Published: (2011)
by: Alshaikhli, Imad Fakhri Taha, et al.
Published: (2011)
Advanced Encryption Standard (AES)
by: Mahmood Al Dabbagh, Sufyan Salim, et al.
Published: (2011)
by: Mahmood Al Dabbagh, Sufyan Salim, et al.
Published: (2011)
File encryption by iris recognition system
by: Musab A. M. Ali,, et al.
Published: (2024)
by: Musab A. M. Ali,, et al.
Published: (2024)
Advanced encryption standard-XTS implementation in field programmable gate array hardware
by: Ahmed, Shakil, et al.
Published: (2015)
by: Ahmed, Shakil, et al.
Published: (2015)
Fast cellular automata implementation on graphic processor unit (GPU) for salt and pepper noise removal
by: Jalalian, Afsaneh, et al.
Published: (2014)
by: Jalalian, Afsaneh, et al.
Published: (2014)
Design of digital signal processor
by: Teo,, Siaw Hui.
Published: (2009)
by: Teo,, Siaw Hui.
Published: (2009)
The Design of an Asynchronous RISC Processor
by: Pee, Yao Hong
Published: (2021)
by: Pee, Yao Hong
Published: (2021)
A socio-cultural and linguistic analysis of yemeni Arabic personal names
by: Abdul Wahed Qasem Ghaleb Al-Zumor,
Published: (2009)
by: Abdul Wahed Qasem Ghaleb Al-Zumor,
Published: (2009)
An improved chaotic image encryption algorithm
by: Al-Khasawneh, Mahmoud Ahmad, et al.
Published: (2018)
by: Al-Khasawneh, Mahmoud Ahmad, et al.
Published: (2018)
The design of an FPGA-based processor with reconfigurable processor execution structure for internet of things (IoT) applications
by: Kiat, Wei Pau
Published: (2018)
by: Kiat, Wei Pau
Published: (2018)
Optical-based hardware encryption device for software protection
by: Ehsan, Abang Annuar, et al.
Published: (2015)
by: Ehsan, Abang Annuar, et al.
Published: (2015)
Analysis for McEliece and Niederreiter Encryptions: An Alternative to Public Key Encryption
by: Chaw, Lian Foong
Published: (2018)
by: Chaw, Lian Foong
Published: (2018)
Encryption using FPGA
by: Nor Robaini, Ibrahim
Published: (2008)
by: Nor Robaini, Ibrahim
Published: (2008)
Image compression and encryption
by: Zainal Abidin, Zuhairiah
Published: (2003)
by: Zainal Abidin, Zuhairiah
Published: (2003)
Similar Items
-
Light database encryption design utilizing multicore processors for mobile devices
by: Alomari, Mohammad Ahmed, et al.
Published: (2019) -
The development of a commercially viable database encryption tool for Oracle8i Rdbms
by: Kama, Mohd. Nazri, et al.
Published: (2005) -
Embedded processor security
by: d'Auriol, Brian J., et al.
Published: (2007) -
A framework for GPU-accelerated AES-XTS encryption in mobile devices
by: Alomari, Mohammad Ahmed, et al.
Published: (2011) -
An embedded database design and implementation of a parallel IEEE XTS storage encryption for mobile devices
by: Alomari, Mohammad Ahmed Mohammad
Published: (2017)