Security for 4G and 5G cellular networks: A survey of existing authentication and privacy-preserving schemes

MA Ferrag, L Maglaras, A Argyriou, D Kosmanos… - Journal of Network and …, 2018 - Elsevier
This paper presents a comprehensive survey of existing authentication and privacy-
preserving schemes for 4G and 5G cellular networks. We start by providing an overview of …

Authentication protocols for internet of things: a comprehensive survey

MA Ferrag, LA Maglaras, H Janicke… - Security and …, 2017 - Wiley Online Library
In this paper, a comprehensive survey of authentication protocols for Internet of Things (IoT)
is presented. Specifically more than forty authentication protocols developed for or applied …

A lightweight authentication and authorization framework for blockchain-enabled IoT network in health-informatics

M Tahir, M Sardaraz, S Muhammad, M Saud Khan - Sustainability, 2020 - mdpi.com
Blockchain and IoT are being deployed at a large scale in various fields including
healthcare for applications such as secure storage, transactions, and process automation …

{DORY}: An encrypted search system with distributed trust

E Dauterman, E Feng, E Luo, RA Popa… - 14th USENIX Symposium …, 2020 - usenix.org
Efficient, leakage-free search on encrypted data has remained an unsolved problem for the
last two decades; efficient schemes are vulnerable to leakage-abuse attacks, and schemes …

Practical volume-hiding encrypted multi-maps with optimal overhead and beyond

J Wang, SF Sun, T Li, S Qi, X Chen - Proceedings of the 2022 ACM …, 2022 - dl.acm.org
Encrypted multi-map (EMM), as a special case of structured encryption, has attracted
extensive attention recently. However, most of EMM constructions reveal the real volumes of …

GLARM: Group-based lightweight authentication scheme for resource-constrained machine to machine communications

C Lai, R Lu, D Zheng, H Li, XS Shen - Computer Networks, 2016 - Elsevier
Supporting a massive number of machine to machine (M2M) devices has been considered
as an essential requirement in M2M communications. Meanwhile, cyber security is of …

Hybrid key encapsulation mechanisms and authenticated key exchange

N Bindel, J Brendel, M Fischlin, B Goncalves… - … 2019, Chongqing, China …, 2019 - Springer
Concerns about the impact of quantum computers on currently deployed public key
cryptography have instigated research into not only quantum-resistant cryptographic …

Verifying and enforcing network paths with ICING

J Naous, M Walfish, A Nicolosi, D Mazieres… - Proceedings of the …, 2011 - dl.acm.org
We describe a new networking primitive, called a Path Verification Mechanism (pvm). There
has been much recent work about how senders and receivers express policies about the …

Multi-client secure and efficient dpf-based keyword search for cloud storage

C Huang, D Liu, A Yang, R Lu… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
In this paper, we propose a multi-client secure and efficient keyword search scheme for
cloud storage, which is built upon distributed point function (DPF). Specifically, outsourced …

{EPIC}: every packet is checked in the data plane of a {Path-Aware} Internet

M Legner, T Klenze, M Wyss, C Sprenger… - 29th USENIX Security …, 2020 - usenix.org
An exciting insight of recent networking research has been that path-aware networking
architectures are able to fundamentally solve many of the security issues of today's Internet …