Symmetric-Key-Based Authentication among the Nodes in a Wireless Sensor and Actuator Network. [PDF]
Vandervelden T +3 more
europepmc +1 more source
The Untapped Potential of Ascon Hash Functions: Benchmarking, Hardware Profiling, and Application Insights for Secure IoT and Blockchain Systems. [PDF]
Gladis Kurian M, Chen Y.
europepmc +1 more source
AES Based White Box Cryptography in Digital Signature Verification. [PDF]
Shukla PK +4 more
europepmc +1 more source
Post-Quantum Secure Lightweight Revocable IBE with Decryption Key Exposure Resistance. [PDF]
Zhang D, Ju H, Yan Z, Feng S, Li F.
europepmc +1 more source
Designing Two Secure Keyed Hash Functions Based on Sponge Construction and the Chaotic Neural Network. [PDF]
Abdoun N +5 more
europepmc +1 more source
Public auditing for real-time medical sensor data in cloud-assisted HealthIIoT system. [PDF]
Ye W, Wang J, Tian H, Quan H.
europepmc +1 more source
Resilient cybersecurity in smart grid ICS communication using BLAKE3-driven dynamic key rotation and intrusion detection. [PDF]
Dokku NS +5 more
europepmc +1 more source
Post-quantum distributed ledger technology: a systematic survey. [PDF]
Parida NK +4 more
europepmc +1 more source
Privacy-preserving computation scheme for the maximum and minimum values of the sums of keyword-corresponding values in cross-chain data exchange. [PDF]
Liu X +9 more
europepmc +1 more source
DeCoTa: a lightweight decentralized cross-chain transfer scheme based on hash-locking. [PDF]
Zou H, Sun H, Chen S, Ren W, Zheng X.
europepmc +1 more source

