Preprints (not yet peer-reviewed)

277 downloads
391 views

Security is always at the forefront of developing technologies. One can seldom go a week without hearing of a new data breach or hacking attempt from various groups around the world, often taking advantage of a simple flaw in a system’s architecture. The Internet...

["Computer Networks and Communications","Embedded Computing","Emerging Technologies","Security and Privacy"]
doi:10.7287/peerj.preprints.26473v2
1,228 downloads
399 views

This survey focuses on authentication methods for the Internet of Things (IoT). There are many different authentication methods that are used in the IT industry but not all of these can be adapted for the IoT. Lightweight and mutual authentication methods will...

["Computer Networks and Communications","Cryptography","Embedded Computing","Security and Privacy"]
doi:10.7287/peerj.preprints.26474v2
456 downloads
505 views

The advancement of technology that have been produced for Internet of Things (IoT) security has grown significantly and exponentially over the years. This has caused a major impact in the world of IoT security as technological companies have to keep up with the...

["Embedded Computing","Mobile and Ubiquitous Computing","Security and Privacy"]
doi:10.7287/peerj.preprints.26504v1
4,209 downloads
2,386 views

The rapid growth of small Internet connected devices, known as the Internet of Things (IoT), is creating a new set of challenges to create secure, private infrastructures. This paper reviews the current literature on the challenges and approaches to security and...

["Computer Networks and Communications","Embedded Computing","Real-Time and Embedded Systems","Security and Privacy","World Wide Web and Web Science"]
doi:10.7287/peerj.preprints.1241v2
200 downloads
796 views

Timing Speculation (TS) is a widely known method for realizing better-than-worst-case systems. Aggressive clocking, realizable by TS, enable systems to operate beyond specified safe frequency limits to effectively exploit the data dependent circuit delay. However,...

["Algorithms and Analysis of Algorithms","Computer Architecture","Embedded Computing","Emerging Technologies"]
doi:10.7287/peerj.preprints.1412v2
209 downloads
348 views

The aim of the given paper is a critical analysis of the prospects of further development of the frequency components with negative resistance. The possible and most promising areas of the development of new and improvement of existing frequency components in various...

["Computer Aided Design","Computer Architecture","Embedded Computing","Emerging Technologies","Real-Time and Embedded Systems"]
doi:10.7287/peerj.preprints.1506v1
What is a PeerJ Preprint?

A PeerJ Preprint is a draft of an article, abstract, or poster that has not yet been peer-reviewed for formal publication. Submit a draft, incomplete, or final version of your work for free.

Submissions today can be approved by Editorial Staff and online in 24 hours.

Establish precedent. Solicit feedback. Publish updates.

Refine by manuscript type

Top subject areas - Preprints

Top subject areas - People

View all subject areas