288

K. K. Mondal and D. Guha Roy

24. Roy DG, Mahato B, Ghosh A, De D (2019) Service aware resource management into cloudlets

for data offloading towards iot. Microsyst Technol, 1–15

25. Jiang H, Zhang Z, Ma Z (2019) Tighter security proofs for generic key encapsulation mech-

anism in the quantum random oracle model. In: International conference on post-quantum

cryptography. Springer, pp 227–248

26. Lee B, Lee J-H (2017) Blockchain-based secure firmware update for embedded devices in an

internet of things environment. J Supercomput 73(3):1152–1167

27. GüneysuT,OderT(2017)Towardslightweightidentity-basedencryptionforthepost-quantum-

secure internet of things. In: 18th international symposium on quality electronic design

(ISQED). IEEE, pp 319–324

28. Fernandez-Carames TM, Fraga-Lamas P (2019) A review on the application of blockchain to

the next generation of cybersecure industry 4.0 smart factories. IEEE Access 7:45201–45218

29. Smart NP (2018) Topics in cryptology–CT-RSA 2018: the cryptographers’ track at the RSA

conference 2018, San Francisco, April 16–20, 2018, Proceedings, vol 10808. Springer (2018)

30. Din S, Ahmad A, Paul A, Rho S (2018) Mgr: Multi-parameter green reliable communication

for internet of things in 5g network. J Parallel Distrib Comput 118:34–45

31. Mahato B, Roy DG, De D (2021) Distributed bandwidth selection approach for cooperative

peer to peer multi-cloud platform. Peer-to-Peer Netw Appl 14(1):177–201

32. Gohar M, Ahmed SH, Khan M, Guizani N, Ahmed A, Rahman AU (2018) A big data analytics

architecture for the internet of small things. IEEE Commun Mag 56(2):128–133

33. Ahmad A, Khan M, Paul A, Din S, Rathore MM, Jeon G, Choi GS (2018) Toward modeling

and optimization of features selection in big data based social internet of things. Futur Gener

Comput Syst 82:715–726

34. Liu Z, Pöppelmann T, Oder T, Seo H, Roy SS, Güneysu T, Großschädl J, Kim H, Verbauwhede I

(2017) High-performance ideal lattice-based cryptography on 8-bit avr microcontrollers. ACM

Trans Embed Comput Syst (TECS) 16(4):1–24

35. Roy DG, Mahato B, De D (2019) A competitive hedonic consumption estimation for iot service

distribution. In: URSI Asia-Pacific radio science conference (AP-RASC). IEEE, pp 1–4

36. Guha Roy D, Srirama SN (2021) A blockchain-based cyber attack detection scheme for decen-

tralized internet of things using software-defined network. In: Software: practice and experience

37. Roy DG, Das M, De D (2018) Cohort assembly: a load balancing grouping approach for

traditional wi-fiinfrastructure using edge cloud. In: Methodologies and application issues of

contemporary computing framework. Springer, pp 93–108

38. Pöppelmann T, Güneysu T (2014) Area optimization of lightweight lattice-based encryption on

reconfigurable hardware. In: IEEE international symposium on circuits and systems (ISCAS).

IEEE, pp 2796–2799

39. Hernández-Rojas DL, Fernández-Caramés TM, Fraga-Lamas P, Escudero CJ (2018) Design

and practical evaluation of a family of lightweight protocols for heterogeneous sensing through

ble beacons in iot telemetry applications. Sensors 18(1):57

40. Damaševiˇcius R, Ziberkas G, Štuikys V, Toldinas J (2012) Energy consumption of hash func-

tions. Elektronika ir elektrotechnika 18(10):81–84

41. Roy DG, Ghosh A, Mahato B, De D (2018) Qos-aware task offloading using self-organized

distributed cloudlet for mobile cloud computing. In: International conference on computational

intelligence, communications, and business analytics. Springer, pp 410–424