Quantum cryptography in 5G networks: a comprehensive overview

M Mehic, L Michalek, E Dervisevic… - … Surveys & Tutorials, 2023 - ieeexplore.ieee.org
Every attempt to access to the Internet through a Web browser, email sent, VPN connection,
VoIP call, instant message or other use of telecommunications systems involves …

A roadmap from classical cryptography to post-quantum resistant cryptography for 5G-enabled IoT: Challenges, opportunities and solutions

D Chawla, PS Mehra - Internet of Things, 2023 - Elsevier
Abstract 5th Generation (5G)-enabled Internet of Things (IoT) connects billions of devices for
high-speed data transfer. The data collected fuel many automation applications such as …

[HTML][HTML] Post-quantum cryptography Algorithm's standardization and performance analysis

M Kumar - Array, 2022 - Elsevier
Quantum computer is no longer a hypothetical idea. It is the world's most important
technology and there is a race among countries to get supremacy in quantum technology. It …

Performance evaluation of secured network traffic classification using a machine learning approach

AA Afuwape, Y Xu, JH Anajemba… - Computer Standards & …, 2021 - Elsevier
Network traffic classification is a significant and problematic aspect of network resource
management arising from an investigation of network developments, planning, and design …

Survey of promising technologies for quantum drones and networks

A Kumar, S Bhatia, K Kaushik, SM Gandhi… - Ieee …, 2021 - ieeexplore.ieee.org
Due to recent advancements in quantum drones, the Internet of Quantum Drones (IoQDs),
and Drone-to-Satellite connectivity, several advantages have been anticipated for real-time …

Lattice-based cryptosystems for the security of resource-constrained IoT devices in post-quantum world: a survey

K Seyhan, TN Nguyen, S Akleylek, K Cengiz - Cluster Computing, 2022 - Springer
The concept of the Internet of Things (IoT) arises due to the change in the characteristics and
numbers of smart devices. Communication of things makes it important to ensure security in …

An improved federated learning approach enhanced internet of health things framework for private decentralized distributed data

C Huang, G Xu, S Chen, W Zhou, EYK Ng… - Information …, 2022 - Elsevier
With the privacy protection increasingly being concerned, Data centralization often heavily
causes a big risk of privacy protection, gradually, there is a prevailing trend to enhance the …

Quantum secure authentication and key agreement protocols for IoT-enabled applications: A comprehensive survey and open challenges

PR Babu, SAP Kumar, AG Reddy, AK Das - Computer Science Review, 2024 - Elsevier
This study provides an in-depth survey of quantum secure authentication and key
agreement protocols, investigating the dynamic landscape of cryptographic techniques …

A machine learning driven threat intelligence system for malicious URL detection

C Rupa, G Srivastava, S Bhattacharya… - Proceedings of the 16th …, 2021 - dl.acm.org
Malicious websites predominantly promote the growth of criminal activities over the Internet
restraining the development of web services. Furthermore, we see different types of devices …

[PDF][PDF] Exploring and reviewing the potential of quantum computing in enhancing cybersecurity encryption methods

OA Ajala, CA Arinze, OC Ofodile, CC Okoye… - 2024 - researchgate.net
As the landscape of cybersecurity continually evolves, traditional encryption methods face
unprecedented challenges from the impending era of quantum computing. This paper …