Is 5G handover secure and private? A survey

D Zhao, Z Yan, M Wang, P Zhang… - IEEE Internet of Things …, 2021 - ieeexplore.ieee.org
The next-generation mobile cellular communication and networking system (5G) is highly
flexible and heterogeneous. It integrates different types of networks, such as 4G legacy …

Improved Handover Authentication in Fifth‐Generation Communication Networks Using Fuzzy Evolutionary Optimisation with Nanocore Elements in Mobile …

J Divakaran, SK Prashanth… - Journal of …, 2022 - Wiley Online Library
Authentication is a suitable form of restricting the network from different types of attacks,
especially in case of fifth‐generation telecommunication networks, especially in healthcare …

[PDF][PDF] Security Improvement by applying Cryptosystems for Authentication in IoT

P Shah, M Arora, K Adhvaryu - Solid State Technology, 2020 - researchgate.net
Public-key cryptography is any cryptographic check that depends upon a typical key that is
utilized to encode or disentangle text/cyphertext, in agree to out of order key cryptography …

[PDF][PDF] Research Article Improved Handover Authentication in Fifth-Generation Communication Networks Using Fuzzy Evolutionary Optimisation with Nanocore …

VP Sundramurthy - 2022 - academia.edu
Authentication is a suitable form of restricting the network from different types of attacks,
especially in case of fifth-generation telecommunication networks, especially in healthcare …

Post-Quantum Algebraic Cryptography Algorithms Designed and Developed for the Internet of Things Eco-Systems

RNP Rodas - 2022 - search.proquest.com
Polynomial-time attacks designed to run on quantum computers and capable of breaking
traditional cryptographic protocols are already known. Quantum-strong algorithms capable …

[CITA][C] Encryption Video Using NTRU and Chaotic Algorithms

ZK Abdalrdha, RT Shawe, SA Hussein, FN Abbas… - Journal of Southwest …, 2019

[CITA][C] 使用 NTRU 和混沌算法的加密视频

EVU NTRU - 西南交通大学学报, 2019