Blockchain-enabled identity management for IoT: a multi-layered defense against adversarial AI. [PDF]
Usama M +5 more
europepmc +1 more source
A scalable and secure federated learning authentication scheme for IoT. [PDF]
Chithaluru P +6 more
europepmc +1 more source
2D-Cosine power sine coupled map with fractal-Fibonacci fusion for hyperchaotic image encryption. [PDF]
Kumar M, Ch D.
europepmc +1 more source
Towards Information-Theoretic Security and Privacy in IoT: A Three-Factor AKA Protocol Supporting Forgotten Password Reset. [PDF]
Yu Y, Wei K, Li H, Zhang K.
europepmc +1 more source
Eliminating single points of trust: a hybrid quantum and post-quantum blockchain with distributed key generation. [PDF]
Goh KW +5 more
europepmc +1 more source
SOBV-FEF: secure lightweight data offloading base in blockchain technology for internet of vehicles enabled handover UAVs within a Fog-Edge federation. [PDF]
Salami Y.
europepmc +1 more source
On Cryptographic Hash Functions: Definitions, Ideas and Practical Cryptographic Attacks
Hash functions, and cryptographic hash functions in particular, underpin the technologies on which modern life is built. Efficient databases, the Internet, the World Wide Web, online payments and more, would not be possible without the security and efficiency gains derived from the use of these functions.
openaire +1 more source
A secure group-based authentication protocol for IoVT in 5G-enabled smart transportation and road safety systems. [PDF]
Singh G +3 more
europepmc +1 more source
SelectVote Byzantine Fault Tolerance for Evidence Custody: Virtual Voting Consensus with Environmental Compensation. [PDF]
Onyeashie BI +3 more
europepmc +1 more source
Post-Quantum enhanced Ascon for secure vehicular IoT data integrity. [PDF]
A J B, P K, R K, R M.
europepmc +1 more source

