Blockchain enabled verification for cellular-connected unmanned aircraft system networking
Abstract The emerging 5G New Radio (5G NR) stimulates the evolution of applications in
many fields. Compared with 4G, 5G NR can provide much more reliable, efficient, flexible …
many fields. Compared with 4G, 5G NR can provide much more reliable, efficient, flexible …
Analysis of the security of internet of multimedia things
Z Lv, L Qiao, H Song - ACM Transactions on Multimedia Computing …, 2020 - dl.acm.org
To study the security performance of the Internet of multimedia things on the privacy
protection of user identity, behavior trajectory, and preference under the new information …
protection of user identity, behavior trajectory, and preference under the new information …
Multi-factor based session secret key agreement for the Industrial Internet of Things
Abstract Industrial Internet of Things (IIoT) is the main field of application of the Internet of
Things (IoT). The high degree of autonomy and resource constraints of the IIoT network …
Things (IoT). The high degree of autonomy and resource constraints of the IIoT network …
A provably secure ECC-based roaming authentication scheme for global mobility networks
The advent of Internet of Things have paved the way for providing smart services for mobile
users in the smart city. Due to the rapid movement of users and their fast information …
users in the smart city. Due to the rapid movement of users and their fast information …
SmartDetour: Defending blackhole and content poisoning attacks in IoT NDN networks
Named data networking (NDN) recently arises as a promising networking paradigm to
support the Internet of Things (IoT) due to its data-centric architecture. However, NDN …
support the Internet of Things (IoT) due to its data-centric architecture. However, NDN …
Fuzzy extraction and PUF based three party authentication protocol using USB as mass storage device
Due to the rapid advancement in on-demand communication and information technologies,
the peripheral connection of computers through Universal Serial Bus (USB) is considered as …
the peripheral connection of computers through Universal Serial Bus (USB) is considered as …
Private computation of the Schulze voting method over the cloud
VK Yadav, A Anand, S Verma, S Venkatesan - Cluster Computing, 2020 - Springer
In this work, we propose an algorithm that computes the Schulze voting method privately
and finds the winner of the candidate without revealing the preferences of the voter. Users …
and finds the winner of the candidate without revealing the preferences of the voter. Users …
ES-HAS: ECC-based secure handover authentication scheme for roaming mobile user in global mobility networks
The design and implementation of two-factor schemes designed for roaming mobile users
for global mobility networks in smart cities requires attention to protect the scheme from …
for global mobility networks in smart cities requires attention to protect the scheme from …
Authentication Framework for an IoT Ecosystem
CJ Ram, S Sathyadevan - International Conference on Data Science and …, 2023 - Springer
The rapid development of the Internet of things (IoT) in different industrial sectors and
medical field. The growth of these devices also raises security issues in IoT devices. The …
medical field. The growth of these devices also raises security issues in IoT devices. The …
Key Exposure Resistant Group Key Agreement Protocol
With the development of the Internet and computer science, the demand for collaboration
over the Internet is constantly increasing. The group key agreement (GKA) protocol has …
over the Internet is constantly increasing. The group key agreement (GKA) protocol has …