288
K. K. Mondal and D. Guha Roy
24. Roy DG, Mahato B, Ghosh A, De D (2019) Service aware resource management into cloudlets
for data offloading towards iot. Microsyst Technol, 1–15
25. Jiang H, Zhang Z, Ma Z (2019) Tighter security proofs for generic key encapsulation mech-
anism in the quantum random oracle model. In: International conference on post-quantum
cryptography. Springer, pp 227–248
26. Lee B, Lee J-H (2017) Blockchain-based secure firmware update for embedded devices in an
internet of things environment. J Supercomput 73(3):1152–1167
27. GüneysuT,OderT(2017)Towardslightweightidentity-basedencryptionforthepost-quantum-
secure internet of things. In: 18th international symposium on quality electronic design
(ISQED). IEEE, pp 319–324
28. Fernandez-Carames TM, Fraga-Lamas P (2019) A review on the application of blockchain to
the next generation of cybersecure industry 4.0 smart factories. IEEE Access 7:45201–45218
29. Smart NP (2018) Topics in cryptology–CT-RSA 2018: the cryptographers’ track at the RSA
conference 2018, San Francisco, April 16–20, 2018, Proceedings, vol 10808. Springer (2018)
30. Din S, Ahmad A, Paul A, Rho S (2018) Mgr: Multi-parameter green reliable communication
for internet of things in 5g network. J Parallel Distrib Comput 118:34–45
31. Mahato B, Roy DG, De D (2021) Distributed bandwidth selection approach for cooperative
peer to peer multi-cloud platform. Peer-to-Peer Netw Appl 14(1):177–201
32. Gohar M, Ahmed SH, Khan M, Guizani N, Ahmed A, Rahman AU (2018) A big data analytics
architecture for the internet of small things. IEEE Commun Mag 56(2):128–133
33. Ahmad A, Khan M, Paul A, Din S, Rathore MM, Jeon G, Choi GS (2018) Toward modeling
and optimization of features selection in big data based social internet of things. Futur Gener
Comput Syst 82:715–726
34. Liu Z, Pöppelmann T, Oder T, Seo H, Roy SS, Güneysu T, Großschädl J, Kim H, Verbauwhede I
(2017) High-performance ideal lattice-based cryptography on 8-bit avr microcontrollers. ACM
Trans Embed Comput Syst (TECS) 16(4):1–24
35. Roy DG, Mahato B, De D (2019) A competitive hedonic consumption estimation for iot service
distribution. In: URSI Asia-Pacific radio science conference (AP-RASC). IEEE, pp 1–4
36. Guha Roy D, Srirama SN (2021) A blockchain-based cyber attack detection scheme for decen-
tralized internet of things using software-defined network. In: Software: practice and experience
37. Roy DG, Das M, De D (2018) Cohort assembly: a load balancing grouping approach for
traditional wi-fiinfrastructure using edge cloud. In: Methodologies and application issues of
contemporary computing framework. Springer, pp 93–108
38. Pöppelmann T, Güneysu T (2014) Area optimization of lightweight lattice-based encryption on
reconfigurable hardware. In: IEEE international symposium on circuits and systems (ISCAS).
IEEE, pp 2796–2799
39. Hernández-Rojas DL, Fernández-Caramés TM, Fraga-Lamas P, Escudero CJ (2018) Design
and practical evaluation of a family of lightweight protocols for heterogeneous sensing through
ble beacons in iot telemetry applications. Sensors 18(1):57
40. Damaševiˇcius R, Ziberkas G, Štuikys V, Toldinas J (2012) Energy consumption of hash func-
tions. Elektronika ir elektrotechnika 18(10):81–84
41. Roy DG, Ghosh A, Mahato B, De D (2018) Qos-aware task offloading using self-organized
distributed cloudlet for mobile cloud computing. In: International conference on computational
intelligence, communications, and business analytics. Springer, pp 410–424