Complementing IoT services through software defined networking and edge computing: A comprehensive survey

W Rafique, L Qi, I Yaqoob, M Imran… - … Surveys & Tutorials, 2020 - ieeexplore.ieee.org
Millions of sensors continuously produce and transmit data to control real-world
infrastructures using complex networks in the Internet of Things (IoT). However, IoT devices …

A survey on wireless security: Technical challenges, recent advances, and future trends

Y Zou, J Zhu, X Wang, L Hanzo - Proceedings of the IEEE, 2016 - ieeexplore.ieee.org
Due to the broadcast nature of radio propagation, the wireless air interface is open and
accessible to both authorized and illegitimate users. This completely differs from a wired …

[BUCH][B] Cryptography: theory and practice

DR Stinson - 2005 - api.taylorfrancis.com
THE LEGACYFirst introduced in 1995, Cryptography: Theory and Practice garnered
enormous praise and popularity, and soon became the standard textbook for cryptography …

Efficient selective-ID secure identity-based encryption without random oracles

D Boneh, X Boyen - … -EUROCRYPT 2004: International Conference on the …, 2004 - Springer
We construct two efficient Identity Based Encryption (IBE) systems that are selective identity
secure without the random oracle model. Selective identity secure IBE is a slightly weaker …

The decision diffie-hellman problem

D Boneh - International algorithmic number theory symposium, 1998 - Springer
Abstract The Decision Diffie-Hellman assumption (ddh) is a gold mine. It enables one to
construct efficient cryptographic systems with strong security properties. In this paper we …

Quantum internet—applications, functionalities, enabling technologies, challenges, and research directions

A Singh, K Dev, H Siljak, HD Joshi… - … Surveys & Tutorials, 2021 - ieeexplore.ieee.org
The advanced notebooks, mobile phones, and Internet applications in today's world that we
use are all entrenched in classical communication bits of zeros and ones. Classical Internet …

Neural cryptography based on complex-valued neural network

T Dong, T Huang - IEEE transactions on neural networks and …, 2019 - ieeexplore.ieee.org
Neural cryptography is a public key exchange algorithm based on the principle of neural
network synchronization. By using the learning algorithm of a neural network, the two neural …

[BUCH][B] Protocols for authentication and key establishment

C Boyd, A Mathuria, D Stebila - 2003 - Springer
The first edition of this book was published in 2003. Inevitably, certain parts of the book
became outdated quickly. At the same time new developments have continued apace …

Number-theoretic constructions of efficient pseudo-random functions

M Naor, O Reingold - Journal of the ACM (JACM), 2004 - dl.acm.org
We describe efficient constructions for various cryptographic primitives in private-key as well
as public-key cryptography. Our main results are two new constructions of pseudo-random …

A survey of key management for secure group communication

S Rafaeli, D Hutchison - ACM Computing Surveys (CSUR), 2003 - dl.acm.org
Group communication can benefit from IP multicast to achieve scalable exchange of
messages. However, there is a challenge of effectively controlling access to the transmitted …