Security and privacy issues in software-defined networking (SDN): A systematic literature review

MS Farooq, S Riaz, A Alvi - Electronics, 2023 - mdpi.com
Software-defined network (SDNs) have fundamentally changed network infrastructure by
decoupling the data plane and the control plane. This architectural shift rejuvenates the …

Medical image encryption: a comprehensive review

ST Ahmed, DA Hammood, RF Chisab, A Al-Naji… - Computers, 2023 - mdpi.com
In medical information systems, image data can be considered crucial information. As
imaging technology and methods for analyzing medical images advance, there will be a …

[PDF][PDF] Status report on the third round of the NIST post-quantum cryptography standardization process

G Alagic, G Alagic, D Apon, D Cooper, Q Dang, T Dang… - 2022 - tsapps.nist.gov
Abstract The National Institute of Standards and Technology is in the process of selecting
publickey cryptographic algorithms through a public, competition-like process. The new …

High-speed NTT-based polynomial multiplication accelerator for post-quantum cryptography

M Bisheh-Niasar, R Azarderakhsh… - 2021 IEEE 28th …, 2021 - ieeexplore.ieee.org
This paper demonstrates an architecture for accelerating the polynomial multiplication using
number theoretic transform (NTT). Kyber is one of the finalists in the third round of the NIST …

A robust privacy-preserving ecc-based three-factor authentication scheme for metaverse environment

G Thakur, P Kumar, CM Chen, AV Vasilakos… - Computer …, 2023 - Elsevier
Metaverse is revolutionizing the future iteration of technology with the potential to ameliorate
efficiency and innovation drastically. It fashions engaging spaces for user interaction that …

Time-efficient finite field microarchitecture design for curve448 and ed448 on cortex-M4

M Anastasova, R Azarderakhsh, MM Kermani… - … on Information Security …, 2022 - Springer
The elliptic curve family of schemes has the lowest computational latency, memory use,
energy consumption, and bandwidth requirements, making it the most preferred public key …

A Review of blockchain technology in knowledge-defined networking, its application, benefits, and challenges

PADSN Wijesekara, S Gunawardena - Network, 2023 - mdpi.com
Knowledge-Defined Networking (KDN) necessarily consists of a knowledge plane for the
generation of knowledge, typically using machine learning techniques, and the …

A secure and efficient log storage and query framework based on blockchain

W Li, Y Feng, N Liu, Y Li, X Fu, YT Yu - Computer Networks, 2024 - Elsevier
Log data is crucial for security threat detection and audit analysis. However, traditional log
systems are susceptible to tampering, posing a significant security risk to information …

Smartphone Security and Privacy: A Survey on APTs, Sensor-Based Attacks, Side-Channel Attacks, Google Play Attacks, and Defenses

Z Muhammad, Z Anwar, AR Javed, B Saleem, S Abbas… - Technologies, 2023 - mdpi.com
There is an exponential rise in the use of smartphones in government and private institutions
due to business dependencies such as communication, virtual meetings, and access to …

Security, privacy, and robustness for trustworthy AI systems: A review

MM Saeed, M Alsharidah - Computers and Electrical Engineering, 2024 - Elsevier
This review article provides a comprehensive exploration of the key pillars of trustworthy AI:
security privacy and robustness. The article delved into security measures both traditional …