Quantum secure authentication and key agreement protocols for IoT-enabled applications: A comprehensive survey and open challenges

PR Babu, SAP Kumar, AG Reddy, AK Das - Computer Science Review, 2024 - Elsevier
This study provides an in-depth survey of quantum secure authentication and key
agreement protocols, investigating the dynamic landscape of cryptographic techniques …

[PDF][PDF] Reducing the Encrypted Data Size: Healthcare with IoT-Cloud Computing Applications.

R Kebache, A Laouid, A Bounceur, M Kara… - … Systems Science & …, 2024 - researchgate.net
Internet cloud services come at a price, especially when they provide top-tier security
measures. The cost incurred by cloud utilization is directly proportional to the storage …

Fuzzy extractor and chaos enhanced elliptic curve cryptography for image encryption and authentication

J Bhat, M Saqib, AH Moon - International Journal of System Assurance …, 2022 - Springer
This paper proposes a novel method for secure image encryption and authentication based
upon fuzzy extractor driven Elliptic Curve key exchange scheme. Use of fuzzy extractor …

Trust-aware Scheduling for Edge Computing with Task Dependencies and Unreliable Servers

Y Alsenani, AS Alnori - IEEE Access, 2023 - ieeexplore.ieee.org
Volunteer Edge Computing (VEC) is a promising solution for addressing the challenge of
high round-trip latency in traditional cloud computing systems. Leveraging distributed …

Signal theory based encryption of faster-than-Nyquist signals for fiber and wireless transmission

A Venugopalan, K Singh, J Meier… - Communications …, 2025 - nature.com
New applications such as the Internet of Things, autonomous driving, Industry X. 0 and many
more will transmit sensitive information via fibers and over the air with envisioned data rates …

When Your Thing Won't Behave: Security Governance in the Internet of Things

M Brennecke, G Fridgen, J Jöhnk, S Radszuwill… - Information Systems …, 2024 - Springer
Abstract In the Internet of Things (IoT), interconnected smart things enable new products and
services in cyber-physical systems. Yet, smart things not only inherit information technology …

A probabilistic model of quantum states for classical data security

MW Hafiz, SO Hwang - Frontiers of Physics, 2023 - Springer
The phenomenal progress of quantum information theory over the last decade has
substantially broadened the potential to simulate the superposition of states for exponential …

Automotive cybersecurity auditing and assessment-presenting the iso pas 5112

C Schmittner - European Conference on Software Process …, 2022 - Springer
With the publication of ISO/SAE 21434 “Road vehicles-Cybersecurity engineering” in 2021,
the first international cybersecurity engineering standard for road vehicles was published …

Cargo Cult or Kula Ring? The Battle for Shared Ethos in Web3

M McKay - EmTech Anthropology, 2024 - taylorfrancis.com
The emergence of blockchain technology spawned numerous experiments in alternative
ownership and value creation. Uniting these was a singular thesis: That decentralized …

[HTML][HTML] Introductory Chapter: Exploring Cryptography–Examining Its Fundamentals and Potential Applications

S Radhakrishnan, SJ Rajan - Biometrics and Cryptography, 2024 - intechopen.com
Fast communication between the digital and physical worlds is made possible by the
Internet of Things (IoT). This rapid growth has made everything in the world to get …