Online banking user authentication methods: a systematic literature review

NA Karim, OA Khashan, H Kanaker… - Ieee …, 2023 - ieeexplore.ieee.org
Online banking has become increasingly popular in recent years, making it a target for
cyberattacks. Banks have implemented various user authentication methods to protect their …

Future-proofing security for UAVs with post-quantum cryptography: A review

MA Khan, S Javaid, SAH Mohsan… - IEEE Open Journal …, 2024 - ieeexplore.ieee.org
Unmanned Aerial Vehicles (UAVs), commonly known as drones, are increasingly being
employed across a broad spectrum of applications, ranging from military operations to …

High-speed NTT accelerator for CRYSTAL-Kyber and CRYSTAL-Dilithium

TH Nguyen, B Kieu-Do-Nguyen, CK Pham… - IEEE …, 2024 - ieeexplore.ieee.org
The efficiency of polynomial multiplication execution majorly impacts the performance of
lattice-based post-quantum cryptosystems. In this research, we propose a high-speed …

[HTML][HTML] IoT forensics readiness-influencing factors

S Friedl, G Pernul - Forensic Science International: Digital Investigation, 2024 - Elsevier
Abstract The Internet of Things (IoT) is increasingly becoming a part of people's lives and is
progressively revolutionizing our lives and businesses. From a Digital Forensics (DF) point …

Temporal ECDSA: A timestamp and signature mask enabled ECDSA algorithm for iot client node authentication

JJ Puthiyidam, S Joseph, B Bhushan - Computer Communications, 2024 - Elsevier
Abstract Internet of Things (IoT) networks are vulnerable to various security threats,
especially in client authentication. The current authentication methods require significant …

Blockchain: A crypto-intensive technology—A comprehensive review

MI Sarwar, LA Maghrabi, I Khan, QH Naith… - IEEE Access, 2023 - ieeexplore.ieee.org
Blockchain has shifted the paradigm of computer-based commercial applications during the
last decade. Initially developed as a public ledger for Bitcoin transactions, it has already …

Cybersecurity in critical infrastructures: A post-quantum cryptography perspective

J Oliva delMoral, A deMarti iOlius… - IEEE Internet of …, 2024 - ieeexplore.ieee.org
The machinery of industrial environments was connected to the Internet years ago with the
scope of increasing their performance. However, this change made such environments …

Exploring post quantum cryptography with quantum key distribution for sustainable mobile network architecture design

S Hoque, A Aydeger, E Zeydan - Proceedings of the 4th Workshop on …, 2024 - dl.acm.org
The proliferation of mobile networks and their increasing importance to modern life,
combined with the emerging threat of quantum computing, present new challenges and …

Envisioning the future of cyber security in post-quantum era: A survey on pq standardization, applications, challenges and opportunities

S Darzi, K Ahmadi, S Aghapour, AA Yavuz… - arxiv preprint arxiv …, 2023 - arxiv.org
The rise of quantum computers exposes vulnerabilities in current public key cryptographic
protocols, necessitating the development of secure post-quantum (PQ) schemes. Hence, we …

[HTML][HTML] An Applied Analysis of Securing 5G/6G Core Networks with Post-Quantum Key Encapsulation Methods

P Scalise, R Garcia, M Boeding, M Hempel, H Sharif - Electronics, 2024 - mdpi.com
Fifth Generation (5G) cellular networks have been adopted worldwide since the rollout
began around 2019. It brought with it many innovations and new services, such as …