Exploring the applications and security threats of Internet of Thing in the cloud computing paradigm: A comprehensive study on the cloud of things
Abstract The term “Internet of Things”(IoT) represents a vast interconnected network
comprising ordinary objects enhanced with electronics like sensors, actuators, and wireless …
comprising ordinary objects enhanced with electronics like sensors, actuators, and wireless …
Resilient intermediary-based key exchange protocol for IoT
Z Hu, J Li, C Wilson - ACM Transactions on Internet of Things, 2024 - dl.acm.org
Due to the limited resources of Internet of Things (IoT) devices, Symmetric Key Cryptography
(SKC) is typically favored over resource-intensive Public Key Cryptography (PKC) to secure …
(SKC) is typically favored over resource-intensive Public Key Cryptography (PKC) to secure …
Mimicking DH Key Exchange Over a Full Duplex Wireless Channel via Bisparse Blind Deconvolution
Secret key generation between authenticated devices is a pivotal task for secure
communications. Diffie-Hellman (DH) is de-facto standard but not post-quantum secure. In …
communications. Diffie-Hellman (DH) is de-facto standard but not post-quantum secure. In …
Toward a resilient key exchange protocol for IoT
In order for resource-constrained Internet of Things (IoT) devices to set up secure
communication channels to exchange confidential messages, Symmetric Key Cryptography …
communication channels to exchange confidential messages, Symmetric Key Cryptography …
WVC: Towards Secure Device Paring for Mobile Augmented Reality
In mobile augmented reality applications, how to build a secure device connection between
two previously unassociated devices without prior set-up is challenging, which also refers to …
two previously unassociated devices without prior set-up is challenging, which also refers to …
TONARI: Reactive Detection of Close Physical Contact Using Unlicensed LPWAN Signals
Recognizing if two objects are in close physical contact (CPC) is the basis of various Internet-
of-Things services such as vehicle proximity alert and radiation exposure reduction. This is …
of-Things services such as vehicle proximity alert and radiation exposure reduction. This is …
Perfectly Secure Key Agreement Over a Full Duplex Wireless Channel
Secret key generation (SKG) between authenticated devices is a pivotal task for secure
communications. Diffie-Hellman (DH) is de-facto standard but not post-quantum secure. In …
communications. Diffie-Hellman (DH) is de-facto standard but not post-quantum secure. In …
Dude, are you approaching me? Detecting close physical contact via unlicensed LPWAN signals
Recognizing if two objects are in close physical contact (CPC) is the basis of various Internet-
of-Mobile-Things services such as vehicle proximity alert and radiation exposure reduction …
of-Mobile-Things services such as vehicle proximity alert and radiation exposure reduction …
Cryptography, Dependability and Privacy in Decentralized Systems
Z Hu - 2023 - search.proquest.com
Decentralized systems are distributed systems that disperse computation tasks to multiple
parties without relying on a trusted central authority. Since any party can be attacked and …
parties without relying on a trusted central authority. Since any party can be attacked and …