A comprehensive survey of cryptography key management systems

S Rana, FK Parast, B Kelly, Y Wang, KB Kent - Journal of Information …, 2023 - Elsevier
Cryptographic methods have been extensively employed in various systems to address
security objectives, such as data confidentiality, authentication, and secure communication …

Security and channel noise management in cognitive radio networks

A Haldorai, A Ramu - Computers & Electrical Engineering, 2020 - Elsevier
Abstract The Spectrum Channel Noise is a pseudorandom or random computational
process in a manner that allows the security competence of the available spectrum …

Lightweight noninteractive membership authentication and group key establishment for WSNs

Q Cheng, C Hsu, L Harn - Mathematical Problems in …, 2020 - Wiley Online Library
Wireless sensor networks (WSNs) exhibit their potential capacity in the next generation of
mobile communication networks and wireless systems (5G). Collected data in WSNs are …

Lightweight privacy-preserving ride-sharing protocols for autonomous cars

S Ramezanian, G Akman, MT Damir… - Proceedings of the 6th …, 2022 - dl.acm.org
Ride-sharing is a popular way of transportation that reduces traffic and the costs of the trip.
Emerge of autonomous vehicles makes ride-sharing more popular because these vehicles …

Symmetric-bivariate-polynomial-based lightweight authenticated group key agreement for industrial internet of things

S Wu, C Hsu, Z **a, J Zhang, D Wu - Journal of Internet Technology, 2020 - jit.ndhu.edu.tw
Nowadays, mobile and embedded cyber-physical systems are ubiquitous and can be found
in many industrial applications, ranging from industrial control systems, modern vehicles, to …

Practical and Secure Password Authentication and Key Agreement Scheme Based Dual-Server for IoT Devices in 5G Network

S Zhang, Y Liu, T Gao, Y **e… - IEEE Internet of Things …, 2024 - ieeexplore.ieee.org
As the proliferation of 5th Generation Mobile Communication Technology (5G) accelerates
the adoption of Internet of Things (IoT) applications, building robust and secure …

Efficient Anonymous Authentication and Group Key Distribution Scheme based on Quantum Random Numbers for VANETs

T Cheng, Q Liu, Q Shi, Z Yang, C Wang… - IEEE Internet of …, 2024 - ieeexplore.ieee.org
Near-field communication in VANETs can effectively reduce communication overhead
compared to peer-to-peer communication. However, there is still plenty of room for …

A centralized key management scheme based on McEliece PKC for space network

J Liu, X Tong, Z Wang, M Zhang, J Ma - IEEE Access, 2020 - ieeexplore.ieee.org
Constrained by the limited resource, high-latency and high bit error rate, the existing group
key management schemes for the space network are inefficient. To solve this problem, we …

Non-interactive dealer-free dynamic threshold secret sharing based on standard shamir's SS for 5G networks

C Hsu, L Harn, Z **a, M Zhang - IEEE Access, 2020 - ieeexplore.ieee.org
Wireless group communications and mobile computing have demonstrated its potential
capacity in the next generation of mobile communication networks and wireless systems …

Non‐interactive integrated membership authentication and group arithmetic computation output for 5G sensor networks

C Hsu, L Harn, Z **a, M Zhang, Z Zhao - IET Communications, 2021 - Wiley Online Library
Group‐oriented applications show its potential ability in the next generation of wireless
sensor networks (5G WSNs), which have the particularity of being heterogeneous and so …