On securing underwater acoustic networks: A survey
S Jiang - IEEE Communications Surveys & Tutorials, 2018 - ieeexplore.ieee.org
Underwater acoustic networks (UWANs) are often deployed in unattended and
untransparent or even hostile environments and face many security threats, while many …
untransparent or even hostile environments and face many security threats, while many …
A smart-contract-based access control framework for cloud smart healthcare system
In current healthcare systems, electronic medical records (EMRs) are always located in
different hospitals and controlled by a centralized cloud provider. However, it leads to single …
different hospitals and controlled by a centralized cloud provider. However, it leads to single …
[HTML][HTML] Smart contract-based security architecture for collaborative services in municipal smart cities
Abstract The Internet of Things (IoT) can provide intelligent and effective solutions to various
applications with higher accuracy that requires less or no human intervention. Smart Cities …
applications with higher accuracy that requires less or no human intervention. Smart Cities …
A survey on blockchain consensus with a performance comparison of PoW, PoS and pure PoS
Blockchain technology started as the backbone for cryptocurriencies and it has emerged as
one of the most interesting technologies of the last decade. It is a new paradigm able to …
one of the most interesting technologies of the last decade. It is a new paradigm able to …
A public-key infrastructure for key distribution in TinyOS based on elliptic curve cryptography
We present the first known implementation of elliptic curve cryptography over F/sub 2p/for
sensor networks based on the 8-bit, 7.3828-MHz MICA2 mote. Through instrumentation of …
sensor networks based on the 8-bit, 7.3828-MHz MICA2 mote. Through instrumentation of …
NanoECC: Testing the limits of elliptic curve cryptography in sensor networks
Abstract By using Elliptic Curve Cryptography (ECC), it has been recently shown that Public-
Key Cryptography (PKC) is indeed feasible on resource-constrained nodes. This feasibility …
Key Cryptography (PKC) is indeed feasible on resource-constrained nodes. This feasibility …
TinyPBC: Pairings for authenticated identity-based non-interactive key distribution in sensor networks
Key distribution in Wireless Sensor Networks (WSNs) is challenging. Symmetric
cryptosystems can perform it efficiently, but they often do not provide a perfect trade-off …
cryptosystems can perform it efficiently, but they often do not provide a perfect trade-off …
Integration of hardware security modules and permissioned blockchain in industrial iot networks
AJ Cabrera-Gutiérrez, E Castillo… - IEEE …, 2022 - ieeexplore.ieee.org
Hardware Security Modules (HSM) serve as a hardware based root of trust that offers
physical protection while adding a new security layer in the system architecture. When …
physical protection while adding a new security layer in the system architecture. When …
Anonymous communications in mobile ad hoc networks
Due to the broadcast nature of radio transmissions, communications in mobile ad hoc
networks (MANETs) are more susceptible to malicious traffic analysis. In this paper we …
networks (MANETs) are more susceptible to malicious traffic analysis. In this paper we …
Taxonomy of public key schemes based on the problem of multivariate quadratic equations
Multivariate quadratic systems can be used to construct both secure and efficient public key
schemes. In this article, we introduce the necessary mathematical tools to deal with …
schemes. In this article, we introduce the necessary mathematical tools to deal with …