Securing fog computing for internet of things applications: Challenges and solutions
Internet of Things (IoT) allows billions of physical objects to be connected to collect and
exchange data for offering various applications, such as environmental monitoring …
exchange data for offering various applications, such as environmental monitoring …
[BUCH][B] Protocols for authentication and key establishment
The first edition of this book was published in 2003. Inevitably, certain parts of the book
became outdated quickly. At the same time new developments have continued apace …
became outdated quickly. At the same time new developments have continued apace …
A public-key traitor tracing scheme with revocation using dynamic shares
WG Tzeng, ZJ Tzeng - … Key Cryptography: 4th International Workshop on …, 2001 - Springer
We proposed a new public-key traitor tracing scheme with revocation capability using the
dynamic share and entity revocation techniques. The enabling block of our scheme is …
dynamic share and entity revocation techniques. The enabling block of our scheme is …
Tate Pairing Implementation for Hyperelliptic Curves y 2 = x p – x + d
Abstract The Weil and Tate pairings have been used recently to build new schemes in
cryptography. It is known that the Weil pairing takes longer than twice the running time of the …
cryptography. It is known that the Weil pairing takes longer than twice the running time of the …
A survey of security issues in multicast communications
The emergence and popularity of group-oriented applications on the World Wide Web has
triggered a demand for scalable security solutions for group communication. One such …
triggered a demand for scalable security solutions for group communication. One such …
Graph-based authentication of digital streams
We consider the authentication of digital streams over a lossy network. The overall approach
taken is graph-based, as this yields simple methods for controlling overhead, delay, and the …
taken is graph-based, as this yields simple methods for controlling overhead, delay, and the …
Long-lived broadcast encryption
In a broadcast encryption scheme, digital content is encrypted to ensure that only privileged
users can recover the content from the encrypted broadcast. Key material is usually held in a …
users can recover the content from the encrypted broadcast. Key material is usually held in a …
A survey on secure communication techniques for 5G wireless heterogeneous networks
A Kakkar - Information Fusion, 2020 - Elsevier
With the increasing number of emerging robust networks, the challenges to design new
security protocols and techniques are never ending. With the enlargement of 5G paradigm …
security protocols and techniques are never ending. With the enlargement of 5G paradigm …
Efficient methods for integrating traceability and broadcast encryption
In many applications for content distribution, broadcast channels are used to transmit
information from a distribution center to a large set of users. Broadcast encryption schemes …
information from a distribution center to a large set of users. Broadcast encryption schemes …
A practical and flexible key management mechanism for trusted collaborative computing
Trusted collaborative computing (TCC) is a new research and application paradigm. Two
important challenges in such a context are represented by secure information transmission …
important challenges in such a context are represented by secure information transmission …