Internet of Things (IoT) is an integral part of application domains such as smart-home, digital healthcare, smart grid systems and vehicular networks. Various standard public key cryptography techniques (e.g., key exchange, public key encryption, digital signature) are available to provide fundamental security services for IoTs. However, despite their pervasiveness and...
The general emphasis of this work has been synthesis, characterization, and applications of n- and p-type inorganic oxide thin films that are deposited from solutions. In particular, a study of n-type transparent semiconductor films of tin (IV) oxide and zinc-doped tin (IV) oxide has been performed by spin coating. Solution...
In recent years, Oblivious Random Access Memory (ORAM) controllers in Trusted Execution Environments (TEEs) have become a popular area of investigation, as coresident trusted systems allow for significantly more efficient oblivious execution. Further, in the case of Intel architectures, oblivious execution effectively eliminates the majority of confidentiality leakage holes in...