A survey of important issues in quantum computing and communications
Driven by the rapid progress in quantum hardware, recent years have witnessed a furious
race for quantum technologies in both academia and industry. Universal quantum …
race for quantum technologies in both academia and industry. Universal quantum …
Security and privacy for 6G: A survey on prospective technologies and challenges
Sixth-generation (6G) mobile networks will have to cope with diverse threats on a space-air-
ground integrated network environment, novel technologies, and an accessible user …
ground integrated network environment, novel technologies, and an accessible user …
Privacy‐preserving federated learning based on multi‐key homomorphic encryption
With the advance of machine learning and the Internet of Things (IoT), security and privacy
have become critical concerns in mobile services and networks. Transferring data to a …
have become critical concerns in mobile services and networks. Transferring data to a …
Towards post-quantum blockchain: A review on blockchain cryptography resistant to quantum computing attacks
Blockchain and other Distributed Ledger Technologies (DLTs) have evolved significantly in
the last years and their use has been suggested for numerous applications due to their …
the last years and their use has been suggested for numerous applications due to their …
Zero trust architecture (zta): A comprehensive survey
We present a detailed survey of the Zero Trust (ZT) security paradigm which has a growing
number of advocates in the critical infrastructure risk management space. The article …
number of advocates in the critical infrastructure risk management space. The article …
Robotics cyber security: Vulnerabilities, attacks, countermeasures, and recommendations
The recent digital revolution led robots to become integrated more than ever into different
domains such as agricultural, medical, industrial, military, police (law enforcement), and …
domains such as agricultural, medical, industrial, military, police (law enforcement), and …
Survey on fully homomorphic encryption, theory, and applications
Data privacy concerns are increasing significantly in the context of the Internet of Things,
cloud services, edge computing, artificial intelligence applications, and other applications …
cloud services, edge computing, artificial intelligence applications, and other applications …
Privacy-preserving solutions for blockchain: Review and challenges
Blockchains offer a decentralized, immutable and verifiable ledger that can record
transactions of digital assets, provoking a radical change in several innovative scenarios …
transactions of digital assets, provoking a radical change in several innovative scenarios …
A systematic review of homomorphic encryption and its contributions in healthcare industry
K Munjal, R Bhatia - Complex & Intelligent Systems, 2023 - Springer
Cloud computing and cloud storage have contributed to a big shift in data processing and its
use. Availability and accessibility of resources with the reduction of substantial work is one of …
use. Availability and accessibility of resources with the reduction of substantial work is one of …
A survey on homomorphic encryption schemes: Theory and implementation
Legacy encryption systems depend on sharing a key (public or private) among the peers
involved in exchanging an encrypted message. However, this approach poses privacy …
involved in exchanging an encrypted message. However, this approach poses privacy …