Quantum cryptography in 5G networks: a comprehensive overview
Every attempt to access to the Internet through a Web browser, email sent, VPN connection,
VoIP call, instant message or other use of telecommunications systems involves …
VoIP call, instant message or other use of telecommunications systems involves …
A roadmap from classical cryptography to post-quantum resistant cryptography for 5G-enabled IoT: Challenges, opportunities and solutions
D Chawla, PS Mehra - Internet of Things, 2023 - Elsevier
Abstract 5th Generation (5G)-enabled Internet of Things (IoT) connects billions of devices for
high-speed data transfer. The data collected fuel many automation applications such as …
high-speed data transfer. The data collected fuel many automation applications such as …
[HTML][HTML] Post-quantum cryptography Algorithm's standardization and performance analysis
M Kumar - Array, 2022 - Elsevier
Quantum computer is no longer a hypothetical idea. It is the world's most important
technology and there is a race among countries to get supremacy in quantum technology. It …
technology and there is a race among countries to get supremacy in quantum technology. It …
Performance evaluation of secured network traffic classification using a machine learning approach
Network traffic classification is a significant and problematic aspect of network resource
management arising from an investigation of network developments, planning, and design …
management arising from an investigation of network developments, planning, and design …
Survey of promising technologies for quantum drones and networks
Due to recent advancements in quantum drones, the Internet of Quantum Drones (IoQDs),
and Drone-to-Satellite connectivity, several advantages have been anticipated for real-time …
and Drone-to-Satellite connectivity, several advantages have been anticipated for real-time …
Lattice-based cryptosystems for the security of resource-constrained IoT devices in post-quantum world: a survey
The concept of the Internet of Things (IoT) arises due to the change in the characteristics and
numbers of smart devices. Communication of things makes it important to ensure security in …
numbers of smart devices. Communication of things makes it important to ensure security in …
An improved federated learning approach enhanced internet of health things framework for private decentralized distributed data
With the privacy protection increasingly being concerned, Data centralization often heavily
causes a big risk of privacy protection, gradually, there is a prevailing trend to enhance the …
causes a big risk of privacy protection, gradually, there is a prevailing trend to enhance the …
Quantum secure authentication and key agreement protocols for IoT-enabled applications: A comprehensive survey and open challenges
This study provides an in-depth survey of quantum secure authentication and key
agreement protocols, investigating the dynamic landscape of cryptographic techniques …
agreement protocols, investigating the dynamic landscape of cryptographic techniques …
A machine learning driven threat intelligence system for malicious URL detection
Malicious websites predominantly promote the growth of criminal activities over the Internet
restraining the development of web services. Furthermore, we see different types of devices …
restraining the development of web services. Furthermore, we see different types of devices …
[PDF][PDF] Exploring and reviewing the potential of quantum computing in enhancing cybersecurity encryption methods
As the landscape of cybersecurity continually evolves, traditional encryption methods face
unprecedented challenges from the impending era of quantum computing. This paper …
unprecedented challenges from the impending era of quantum computing. This paper …