Security and privacy issues in software-defined networking (SDN): A systematic literature review
Software-defined network (SDNs) have fundamentally changed network infrastructure by
decoupling the data plane and the control plane. This architectural shift rejuvenates the …
decoupling the data plane and the control plane. This architectural shift rejuvenates the …
Medical image encryption: a comprehensive review
In medical information systems, image data can be considered crucial information. As
imaging technology and methods for analyzing medical images advance, there will be a …
imaging technology and methods for analyzing medical images advance, there will be a …
[PDF][PDF] Status report on the third round of the NIST post-quantum cryptography standardization process
Abstract The National Institute of Standards and Technology is in the process of selecting
publickey cryptographic algorithms through a public, competition-like process. The new …
publickey cryptographic algorithms through a public, competition-like process. The new …
High-speed NTT-based polynomial multiplication accelerator for post-quantum cryptography
This paper demonstrates an architecture for accelerating the polynomial multiplication using
number theoretic transform (NTT). Kyber is one of the finalists in the third round of the NIST …
number theoretic transform (NTT). Kyber is one of the finalists in the third round of the NIST …
A robust privacy-preserving ecc-based three-factor authentication scheme for metaverse environment
Metaverse is revolutionizing the future iteration of technology with the potential to ameliorate
efficiency and innovation drastically. It fashions engaging spaces for user interaction that …
efficiency and innovation drastically. It fashions engaging spaces for user interaction that …
Time-efficient finite field microarchitecture design for curve448 and ed448 on cortex-M4
The elliptic curve family of schemes has the lowest computational latency, memory use,
energy consumption, and bandwidth requirements, making it the most preferred public key …
energy consumption, and bandwidth requirements, making it the most preferred public key …
A Review of blockchain technology in knowledge-defined networking, its application, benefits, and challenges
Knowledge-Defined Networking (KDN) necessarily consists of a knowledge plane for the
generation of knowledge, typically using machine learning techniques, and the …
generation of knowledge, typically using machine learning techniques, and the …
A secure and efficient log storage and query framework based on blockchain
W Li, Y Feng, N Liu, Y Li, X Fu, YT Yu - Computer Networks, 2024 - Elsevier
Log data is crucial for security threat detection and audit analysis. However, traditional log
systems are susceptible to tampering, posing a significant security risk to information …
systems are susceptible to tampering, posing a significant security risk to information …
Smartphone Security and Privacy: A Survey on APTs, Sensor-Based Attacks, Side-Channel Attacks, Google Play Attacks, and Defenses
There is an exponential rise in the use of smartphones in government and private institutions
due to business dependencies such as communication, virtual meetings, and access to …
due to business dependencies such as communication, virtual meetings, and access to …
Security, privacy, and robustness for trustworthy AI systems: A review
MM Saeed, M Alsharidah - Computers and Electrical Engineering, 2024 - Elsevier
This review article provides a comprehensive exploration of the key pillars of trustworthy AI:
security privacy and robustness. The article delved into security measures both traditional …
security privacy and robustness. The article delved into security measures both traditional …