A comprehensive survey of cryptography key management systems
Cryptographic methods have been extensively employed in various systems to address
security objectives, such as data confidentiality, authentication, and secure communication …
security objectives, such as data confidentiality, authentication, and secure communication …
Security and channel noise management in cognitive radio networks
A Haldorai, A Ramu - Computers & Electrical Engineering, 2020 - Elsevier
Abstract The Spectrum Channel Noise is a pseudorandom or random computational
process in a manner that allows the security competence of the available spectrum …
process in a manner that allows the security competence of the available spectrum …
Lightweight noninteractive membership authentication and group key establishment for WSNs
Wireless sensor networks (WSNs) exhibit their potential capacity in the next generation of
mobile communication networks and wireless systems (5G). Collected data in WSNs are …
mobile communication networks and wireless systems (5G). Collected data in WSNs are …
Lightweight privacy-preserving ride-sharing protocols for autonomous cars
Ride-sharing is a popular way of transportation that reduces traffic and the costs of the trip.
Emerge of autonomous vehicles makes ride-sharing more popular because these vehicles …
Emerge of autonomous vehicles makes ride-sharing more popular because these vehicles …
Symmetric-bivariate-polynomial-based lightweight authenticated group key agreement for industrial internet of things
S Wu, C Hsu, Z **a, J Zhang, D Wu - Journal of Internet Technology, 2020 - jit.ndhu.edu.tw
Nowadays, mobile and embedded cyber-physical systems are ubiquitous and can be found
in many industrial applications, ranging from industrial control systems, modern vehicles, to …
in many industrial applications, ranging from industrial control systems, modern vehicles, to …
Practical and Secure Password Authentication and Key Agreement Scheme Based Dual-Server for IoT Devices in 5G Network
S Zhang, Y Liu, T Gao, Y **e… - IEEE Internet of Things …, 2024 - ieeexplore.ieee.org
As the proliferation of 5th Generation Mobile Communication Technology (5G) accelerates
the adoption of Internet of Things (IoT) applications, building robust and secure …
the adoption of Internet of Things (IoT) applications, building robust and secure …
Efficient Anonymous Authentication and Group Key Distribution Scheme based on Quantum Random Numbers for VANETs
T Cheng, Q Liu, Q Shi, Z Yang, C Wang… - IEEE Internet of …, 2024 - ieeexplore.ieee.org
Near-field communication in VANETs can effectively reduce communication overhead
compared to peer-to-peer communication. However, there is still plenty of room for …
compared to peer-to-peer communication. However, there is still plenty of room for …
A centralized key management scheme based on McEliece PKC for space network
J Liu, X Tong, Z Wang, M Zhang, J Ma - IEEE Access, 2020 - ieeexplore.ieee.org
Constrained by the limited resource, high-latency and high bit error rate, the existing group
key management schemes for the space network are inefficient. To solve this problem, we …
key management schemes for the space network are inefficient. To solve this problem, we …
Non-interactive dealer-free dynamic threshold secret sharing based on standard shamir's SS for 5G networks
Wireless group communications and mobile computing have demonstrated its potential
capacity in the next generation of mobile communication networks and wireless systems …
capacity in the next generation of mobile communication networks and wireless systems …
Non‐interactive integrated membership authentication and group arithmetic computation output for 5G sensor networks
Group‐oriented applications show its potential ability in the next generation of wireless
sensor networks (5G WSNs), which have the particularity of being heterogeneous and so …
sensor networks (5G WSNs), which have the particularity of being heterogeneous and so …