Security for 4G and 5G cellular networks: A survey of existing authentication and privacy-preserving schemes
This paper presents a comprehensive survey of existing authentication and privacy-
preserving schemes for 4G and 5G cellular networks. We start by providing an overview of …
preserving schemes for 4G and 5G cellular networks. We start by providing an overview of …
Authentication protocols for internet of things: a comprehensive survey
In this paper, a comprehensive survey of authentication protocols for Internet of Things (IoT)
is presented. Specifically more than forty authentication protocols developed for or applied …
is presented. Specifically more than forty authentication protocols developed for or applied …
A lightweight authentication and authorization framework for blockchain-enabled IoT network in health-informatics
Blockchain and IoT are being deployed at a large scale in various fields including
healthcare for applications such as secure storage, transactions, and process automation …
healthcare for applications such as secure storage, transactions, and process automation …
{DORY}: An encrypted search system with distributed trust
Efficient, leakage-free search on encrypted data has remained an unsolved problem for the
last two decades; efficient schemes are vulnerable to leakage-abuse attacks, and schemes …
last two decades; efficient schemes are vulnerable to leakage-abuse attacks, and schemes …
Practical volume-hiding encrypted multi-maps with optimal overhead and beyond
Encrypted multi-map (EMM), as a special case of structured encryption, has attracted
extensive attention recently. However, most of EMM constructions reveal the real volumes of …
extensive attention recently. However, most of EMM constructions reveal the real volumes of …
GLARM: Group-based lightweight authentication scheme for resource-constrained machine to machine communications
Supporting a massive number of machine to machine (M2M) devices has been considered
as an essential requirement in M2M communications. Meanwhile, cyber security is of …
as an essential requirement in M2M communications. Meanwhile, cyber security is of …
Hybrid key encapsulation mechanisms and authenticated key exchange
Concerns about the impact of quantum computers on currently deployed public key
cryptography have instigated research into not only quantum-resistant cryptographic …
cryptography have instigated research into not only quantum-resistant cryptographic …
Verifying and enforcing network paths with ICING
We describe a new networking primitive, called a Path Verification Mechanism (pvm). There
has been much recent work about how senders and receivers express policies about the …
has been much recent work about how senders and receivers express policies about the …
Multi-client secure and efficient dpf-based keyword search for cloud storage
In this paper, we propose a multi-client secure and efficient keyword search scheme for
cloud storage, which is built upon distributed point function (DPF). Specifically, outsourced …
cloud storage, which is built upon distributed point function (DPF). Specifically, outsourced …
{EPIC}: every packet is checked in the data plane of a {Path-Aware} Internet
An exciting insight of recent networking research has been that path-aware networking
architectures are able to fundamentally solve many of the security issues of today's Internet …
architectures are able to fundamentally solve many of the security issues of today's Internet …