Realizing an internet of secure things: A survey on issues and enabling technologies
Since the term first coined in 1999, the Internet of Things (IoT) has gained significant
momentum in connecting physical objects to the Internet and facilitating machine-to-human …
momentum in connecting physical objects to the Internet and facilitating machine-to-human …
Post-quantum cryptography: state of the art
Public-key cryptography is indispensable for cyber security. However, as a result of Peter
Shor shows, the public-key schemes that are being used today will become insecure once …
Shor shows, the public-key schemes that are being used today will become insecure once …
Security bounds for the design of code-based cryptosystems
Code-based cryptography is often viewed as an interesting “Post-Quantum” alternative to
the classical number theory cryptography. Unlike many other such alternatives, it has the …
the classical number theory cryptography. Unlike many other such alternatives, it has the …
Survey of promising technologies for quantum drones and networks
Due to recent advancements in quantum drones, the Internet of Quantum Drones (IoQDs),
and Drone-to-Satellite connectivity, several advantages have been anticipated for real-time …
and Drone-to-Satellite connectivity, several advantages have been anticipated for real-time …
A survey on key management mechanisms for distributed wireless sensor networks
Wireless Sensor Networks (WSNs) have a vast field of applications, including deployment in
hostile environments. Thus, the adoption of security mechanisms is fundamental. However …
hostile environments. Thus, the adoption of security mechanisms is fundamental. However …
[책][B] Concise encyclopedia of coding theory
Most coding theory experts date the origin of the subject with the 1948 publication of A
Mathematical Theory of Communication by Claude Shannon. Since then, coding theory has …
Mathematical Theory of Communication by Claude Shannon. Since then, coding theory has …
Cost-effective authentic and anonymous data sharing with forward security
Data sharing has never been easier with the advances of cloud computing, and an accurate
analysis on the shared data provides an array of benefits to both the society and individuals …
analysis on the shared data provides an array of benefits to both the society and individuals …
A zero-knowledge identification scheme based on the q-ary syndrome decoding problem
At CRYPTO'93, Stern proposed a 3-pass code-based identification scheme with a cheating
probability of 2/3. In this paper, we propose a 5-pass code-based protocol with a lower …
probability of 2/3. In this paper, we propose a 5-pass code-based protocol with a lower …
A survey on group signatures and ring signatures: Traceability vs. anonymity
MNS Perera, T Nakamura, M Hashimoto, H Yokoyama… - Cryptography, 2022 - mdpi.com
This survey reviews the two most prominent group-oriented anonymous signature schemes
and analyzes the existing approaches for their problem: balancing anonymity against …
and analyzes the existing approaches for their problem: balancing anonymity against …
An efficient multi-mode certificateless ring signcryption scheme in vanets
Q Zhan, M Luo, M Qiu - IEEE Internet of Things Journal, 2024 - ieeexplore.ieee.org
The swift advancement of new energy vehicles and the integration of autonomous driving
technologies have propelled vehicular ad hoc networks (VANETs) into a prominent research …
technologies have propelled vehicular ad hoc networks (VANETs) into a prominent research …