Realizing an internet of secure things: A survey on issues and enabling technologies

SA Hamad, QZ Sheng, WE Zhang… - … Surveys & Tutorials, 2020 - ieeexplore.ieee.org
Since the term first coined in 1999, the Internet of Things (IoT) has gained significant
momentum in connecting physical objects to the Internet and facilitating machine-to-human …

Post-quantum cryptography: state of the art

JA Buchmann, D Butin, F Göpfert, A Petzoldt - … Kahn on the Occasion of His …, 2016 - Springer
Public-key cryptography is indispensable for cyber security. However, as a result of Peter
Shor shows, the public-key schemes that are being used today will become insecure once …

Security bounds for the design of code-based cryptosystems

M Finiasz, N Sendrier - Advances in Cryptology–ASIACRYPT 2009: 15th …, 2009 - Springer
Code-based cryptography is often viewed as an interesting “Post-Quantum” alternative to
the classical number theory cryptography. Unlike many other such alternatives, it has the …

Survey of promising technologies for quantum drones and networks

A Kumar, S Bhatia, K Kaushik, SM Gandhi… - Ieee …, 2021 - ieeexplore.ieee.org
Due to recent advancements in quantum drones, the Internet of Quantum Drones (IoQDs),
and Drone-to-Satellite connectivity, several advantages have been anticipated for real-time …

A survey on key management mechanisms for distributed wireless sensor networks

MA Simplício Jr, PSLM Barreto, CB Margi… - Computer …, 2010 - Elsevier
Wireless Sensor Networks (WSNs) have a vast field of applications, including deployment in
hostile environments. Thus, the adoption of security mechanisms is fundamental. However …

[책][B] Concise encyclopedia of coding theory

WC Huffman, JL Kim, P Solé - 2021 - api.taylorfrancis.com
Most coding theory experts date the origin of the subject with the 1948 publication of A
Mathematical Theory of Communication by Claude Shannon. Since then, coding theory has …

Cost-effective authentic and anonymous data sharing with forward security

X Huang, JK Liu, S Tang, Y **ang… - IEEE Transactions …, 2014 - ieeexplore.ieee.org
Data sharing has never been easier with the advances of cloud computing, and an accurate
analysis on the shared data provides an array of benefits to both the society and individuals …

A zero-knowledge identification scheme based on the q-ary syndrome decoding problem

PL Cayrel, P Véron, SM El Yousfi Alaoui - International Workshop on …, 2010 - Springer
At CRYPTO'93, Stern proposed a 3-pass code-based identification scheme with a cheating
probability of 2/3. In this paper, we propose a 5-pass code-based protocol with a lower …

A survey on group signatures and ring signatures: Traceability vs. anonymity

MNS Perera, T Nakamura, M Hashimoto, H Yokoyama… - Cryptography, 2022 - mdpi.com
This survey reviews the two most prominent group-oriented anonymous signature schemes
and analyzes the existing approaches for their problem: balancing anonymity against …

An efficient multi-mode certificateless ring signcryption scheme in vanets

Q Zhan, M Luo, M Qiu - IEEE Internet of Things Journal, 2024 - ieeexplore.ieee.org
The swift advancement of new energy vehicles and the integration of autonomous driving
technologies have propelled vehicular ad hoc networks (VANETs) into a prominent research …