Medical image encryption: a comprehensive review

ST Ahmed, DA Hammood, RF Chisab, A Al-Naji… - Computers, 2023 - mdpi.com
In medical information systems, image data can be considered crucial information. As
imaging technology and methods for analyzing medical images advance, there will be a …

Smartphone Security and Privacy: A Survey on APTs, Sensor-Based Attacks, Side-Channel Attacks, Google Play Attacks, and Defenses

Z Muhammad, Z Anwar, AR Javed, B Saleem, S Abbas… - Technologies, 2023 - mdpi.com
There is an exponential rise in the use of smartphones in government and private institutions
due to business dependencies such as communication, virtual meetings, and access to …

Time-efficient finite field microarchitecture design for curve448 and ed448 on cortex-M4

M Anastasova, R Azarderakhsh, MM Kermani… - … on Information Security …, 2022 - Springer
The elliptic curve family of schemes has the lowest computational latency, memory use,
energy consumption, and bandwidth requirements, making it the most preferred public key …

Security, privacy, and robustness for trustworthy AI systems: A review

MM Saeed, M Alsharidah - Computers and Electrical Engineering, 2024 - Elsevier
This review article provides a comprehensive exploration of the key pillars of trustworthy AI:
security privacy and robustness. The article delved into security measures both traditional …

Attribute-based encryption schemes for next generation wireless IoT networks: a comprehensive survey

Shruti, S Rani, DK Sah, G Gianini - Sensors, 2023 - mdpi.com
Most data nowadays are stored in the cloud; therefore, cloud computing and its extension—
fog computing—are the most in-demand services at the present time. Cloud and fog …

Time-optimal design of finite field arithmetic for sike on cortex-m4

M Anastasova, R Azarderakhsh… - … Conference on Information …, 2022 - Springer
The advances in quantum technologies and the fast move toward quantum computing are
threatening classical cryptography and urge the deployment of post-quantum (PQ) schemes …

Efficient and side-channel resistant design of high-security Ed448 on ARM Cortex-M4

M Anastasova, M Bisheh-Niasar, H Seo… - … Security and Trust …, 2022 - ieeexplore.ieee.org
The demand for classical cryptography schemes continues to increase due to the exhaustive
studies on their security. Thus, constant improvement of timing, power consumption, and …

Review of Physical Layer Security in 5G Wireless Networks

J Boodai, A Alqahtani, M Frikha - Applied Sciences, 2023 - mdpi.com
Fifth generation (5G) wireless networks promise to revolutionize the way we communicate
and connect to the internet. However, as with any new technology, 5G networks also bring …

Side-channel analysis and countermeasure design for implementation of Curve448 on cortex-M4

M Bisheh-Niasar, M Anastasova, A Abdulgadir… - Proceedings of the 11th …, 2022 - dl.acm.org
The highly secure Curve448 cryptographic algorithm has been recently recommended by
NIST. While this algorithm provides 224-bit security over elliptic curve cryptography, its …

[HTML][HTML] A machine learning-based assessment model for defect diagnosis in XLPE power cables

SI Evangeline, S Darwin, K Baskaran, EFI Raj - e-Prime-Advances in …, 2024 - Elsevier
Cross-linked polyethylene (XLPE) power cables are commonly used in flexible DC
transmission applications. The diagnosis of the defects of XLPE power cable has …