Securing fog computing for internet of things applications: Challenges and solutions

J Ni, K Zhang, X Lin, X Shen - IEEE Communications Surveys & …, 2017 - ieeexplore.ieee.org
Internet of Things (IoT) allows billions of physical objects to be connected to collect and
exchange data for offering various applications, such as environmental monitoring …

[BUCH][B] Protocols for authentication and key establishment

C Boyd, A Mathuria, D Stebila - 2003 - Springer
The first edition of this book was published in 2003. Inevitably, certain parts of the book
became outdated quickly. At the same time new developments have continued apace …

A public-key traitor tracing scheme with revocation using dynamic shares

WG Tzeng, ZJ Tzeng - … Key Cryptography: 4th International Workshop on …, 2001 - Springer
We proposed a new public-key traitor tracing scheme with revocation capability using the
dynamic share and entity revocation techniques. The enabling block of our scheme is …

Tate Pairing Implementation for Hyperelliptic Curves y 2 = x p x + d

I Duursma, HS Lee - Advances in Cryptology-ASIACRYPT 2003: 9th …, 2003 - Springer
Abstract The Weil and Tate pairings have been used recently to build new schemes in
cryptography. It is known that the Weil pairing takes longer than twice the running time of the …

A survey of security issues in multicast communications

MJ Moyer, JR Rao, P Rohatgi - IEEE network, 1999 - ieeexplore.ieee.org
The emergence and popularity of group-oriented applications on the World Wide Web has
triggered a demand for scalable security solutions for group communication. One such …

Graph-based authentication of digital streams

S Miner, J Staddon - … 2001 IEEE Symposium on Security and …, 2000 - ieeexplore.ieee.org
We consider the authentication of digital streams over a lossy network. The overall approach
taken is graph-based, as this yields simple methods for controlling overhead, delay, and the …

Long-lived broadcast encryption

JA Garay, J Staddon, A Wool - Annual International Cryptology Conference, 2000 - Springer
In a broadcast encryption scheme, digital content is encrypted to ensure that only privileged
users can recover the content from the encrypted broadcast. Key material is usually held in a …

A survey on secure communication techniques for 5G wireless heterogeneous networks

A Kakkar - Information Fusion, 2020 - Elsevier
With the increasing number of emerging robust networks, the challenges to design new
security protocols and techniques are never ending. With the enlargement of 5G paradigm …

Efficient methods for integrating traceability and broadcast encryption

E Gafni, J Staddon, YL Yin - Annual International Cryptology Conference, 1999 - Springer
In many applications for content distribution, broadcast channels are used to transmit
information from a distribution center to a large set of users. Broadcast encryption schemes …

A practical and flexible key management mechanism for trusted collaborative computing

X Zou, YS Dai, E Bertino - IEEE INFOCOM 2008-The 27th …, 2008 - ieeexplore.ieee.org
Trusted collaborative computing (TCC) is a new research and application paradigm. Two
important challenges in such a context are represented by secure information transmission …