A verifiably secure and robust authentication protocol for synergistically-assisted IoD deployment drones. [PDF]
Algarni AD, Innab N, Algarni F.
europepmc +1 more source
Algorithm for Key Transparency with Transparent Logs. [PDF]
Mollakuqe E+4 more
europepmc +1 more source
Improving dependability with low power fault detection model for skinny-hash. [PDF]
Arvind Barge S, Mary GI.
europepmc +1 more source
A secure end-to-end communication framework for cooperative IoT networks using hybrid blockchain system. [PDF]
Erukala SB+6 more
europepmc +1 more source
Bases selection with pseudo-random functions in BB84 scheme
Because the spectrum of services available in modern telecommunication networks is constantly expanding, security has become increasingly important. Simultaneously, in an era of constant progress in mathematics and computing, the security of existing ...
Emir Dervisevic+2 more
doaj
Towards Secure Internet of Things: A Coercion-Resistant Attribute-Based Encryption Scheme with Policy Revocation. [PDF]
Zhai Y, Wang T, Zhou Y, Zhu F, Yang B.
europepmc +1 more source
Enhanced lightweight and compromised-resilient image encryption for resource constrained environments. [PDF]
Mehmood A+5 more
europepmc +1 more source
Ethernet Passive Mutual Authentication Scheme on Quantum Networks. [PDF]
Tian J, Qin P, Zhao Z, Qin B.
europepmc +1 more source
An efficient ECC and fuzzy verifier based user authentication protocol for IoT enabled WSNs. [PDF]
Sudhakar T, Praveen R, Natarajan V.
europepmc +1 more source
Transparent and Privacy-Preserving Mobile Crowd-Sensing System with Truth Discovery. [PDF]
Jia R, Ma J, You Z, Zhang M.
europepmc +1 more source