A blockchain-assisted privacy-preserving signature scheme using quantum teleportation for metaverse environment in Web 3.0
At the forefront of next-generation internet technology, the concept of the metaverse is
gaining traction. It unifies the virtual and physical worlds into a single virtual realm and has …
gaining traction. It unifies the virtual and physical worlds into a single virtual realm and has …
A robust ECC based authentication protocol for satellite-to-satellite communication network
Harnessing satellite resources to designate a communication network has felicitous the
flexibility to bounteous applications, including broadcasting, news gathering, aeronautical …
flexibility to bounteous applications, including broadcasting, news gathering, aeronautical …
A provably secure authenticated key agreement protocol for industrial sensor network system
The convergence of reliable and self‐organizing characteristics of Wireless Sensor
Networks (WSNs) and the IoT has increased the utilization of WSN in different scenarios …
Networks (WSNs) and the IoT has increased the utilization of WSN in different scenarios …
Security analysis and provision of authentication protocol, based on peer-to-peer structure in IOT platform
D Liu, T Ji - Scientific Reports, 2024 - nature.com
Abstract The Internet of Things technology allows you to transfer data to any asset through
communication networks such as the Internet or intranet. One of the most important …
communication networks such as the Internet or intranet. One of the most important …
Quantum safe lightweight encryption scheme for secure data sharing in Internet of Nano Things
Abstract The Internet of Nano Things (IoNT) is increasingly recognized as a superior
alternative to the Internet of Things (IoT) due to its inherent benefits. However, the security of …
alternative to the Internet of Things (IoT) due to its inherent benefits. However, the security of …
Design of Secure and Efficient Framework for Vehicular Digital Twin Networks using ECC
Digital twins (DT) are digital copies of tangible assets and operations utilised in some
industries to improve efficiency and foster creativity, accuracy, and decision making …
industries to improve efficiency and foster creativity, accuracy, and decision making …
Blockchain Assisted Intra-Twin and Inter-Twin Authentication Scheme for Vehicular Digital Twin System
The potency of digital twins to mitigate the shortcomings of traditional mobility systems, such
as Vehicular Adhoc Network (VANET) can reconfigure it into an intelligent transportation …
as Vehicular Adhoc Network (VANET) can reconfigure it into an intelligent transportation …
Healthcare 5.0 Multi-Party Key Authentication Protocol Based on the Internet of Medical Things
X Zhao, C Peng, W Tan, H Ding - Available at SSRN 4911416 - papers.ssrn.com
Protocols for authenticating keys in Healthcare 5.0 facilitate mutual authentication and
uniformity in establishing a shared session key across medical wearable devices …
uniformity in establishing a shared session key across medical wearable devices …