Survey on White-Box Attacks and Solutions

  • Porkodi V
  • Sivaram M
  • Mohammed A
  • et al.
N/ACitations
Citations of this article
8Readers
Mendeley users who have this article in their library.

Abstract

This Research paper provides special white-box attacks and outputs from it. Wearable IoT units perform keep doubtlessly captured, then accessed within an unauthorized behavior due to the fact concerning their bodily nature. That case, they are between white-box attack systems, toughness the opponent may additionally have quantity,visibility about the implementation of the inbuilt crypto system including complete control over its solution platform. The white-box attacks on wearable devices is an assignment without a doubt. To serve as a countermeasure in opposition to these problems in such contexts, here analyzing encryption schemes in imitation of protecting the confidentiality concerning records against white-box attacks. The lightweight encryption, intention in accordance with protecting the confidentiality over data towards white-box attacks is the recently stability good algorithm. In that paper, we read the extraordinary algorithms too.

Cite

CITATION STYLE

APA

Porkodi, V., Sivaram, M., Mohammed, A. S., & Manikandan, V. (2018). Survey on White-Box Attacks and Solutions. Asian Journal of Computer Science and Technology, 7(3), 28–32. https://doi.org/10.51983/ajcst-2018.7.3.1904

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free