Quantum secure authentication and key agreement protocols for IoT-enabled applications: A comprehensive survey and open challenges
This study provides an in-depth survey of quantum secure authentication and key
agreement protocols, investigating the dynamic landscape of cryptographic techniques …
agreement protocols, investigating the dynamic landscape of cryptographic techniques …
[PDF][PDF] Reducing the Encrypted Data Size: Healthcare with IoT-Cloud Computing Applications.
Internet cloud services come at a price, especially when they provide top-tier security
measures. The cost incurred by cloud utilization is directly proportional to the storage …
measures. The cost incurred by cloud utilization is directly proportional to the storage …
Fuzzy extractor and chaos enhanced elliptic curve cryptography for image encryption and authentication
This paper proposes a novel method for secure image encryption and authentication based
upon fuzzy extractor driven Elliptic Curve key exchange scheme. Use of fuzzy extractor …
upon fuzzy extractor driven Elliptic Curve key exchange scheme. Use of fuzzy extractor …
Trust-aware Scheduling for Edge Computing with Task Dependencies and Unreliable Servers
Volunteer Edge Computing (VEC) is a promising solution for addressing the challenge of
high round-trip latency in traditional cloud computing systems. Leveraging distributed …
high round-trip latency in traditional cloud computing systems. Leveraging distributed …
Signal theory based encryption of faster-than-Nyquist signals for fiber and wireless transmission
New applications such as the Internet of Things, autonomous driving, Industry X. 0 and many
more will transmit sensitive information via fibers and over the air with envisioned data rates …
more will transmit sensitive information via fibers and over the air with envisioned data rates …
When Your Thing Won't Behave: Security Governance in the Internet of Things
Abstract In the Internet of Things (IoT), interconnected smart things enable new products and
services in cyber-physical systems. Yet, smart things not only inherit information technology …
services in cyber-physical systems. Yet, smart things not only inherit information technology …
A probabilistic model of quantum states for classical data security
The phenomenal progress of quantum information theory over the last decade has
substantially broadened the potential to simulate the superposition of states for exponential …
substantially broadened the potential to simulate the superposition of states for exponential …
Automotive cybersecurity auditing and assessment-presenting the iso pas 5112
C Schmittner - European Conference on Software Process …, 2022 - Springer
With the publication of ISO/SAE 21434 “Road vehicles-Cybersecurity engineering” in 2021,
the first international cybersecurity engineering standard for road vehicles was published …
the first international cybersecurity engineering standard for road vehicles was published …
Cargo Cult or Kula Ring? The Battle for Shared Ethos in Web3
M McKay - EmTech Anthropology, 2024 - taylorfrancis.com
The emergence of blockchain technology spawned numerous experiments in alternative
ownership and value creation. Uniting these was a singular thesis: That decentralized …
ownership and value creation. Uniting these was a singular thesis: That decentralized …
[HTML][HTML] Introductory Chapter: Exploring Cryptography–Examining Its Fundamentals and Potential Applications
S Radhakrishnan, SJ Rajan - Biometrics and Cryptography, 2024 - intechopen.com
Fast communication between the digital and physical worlds is made possible by the
Internet of Things (IoT). This rapid growth has made everything in the world to get …
Internet of Things (IoT). This rapid growth has made everything in the world to get …