Blockchain-assisted UAV communication systems: A comprehensive survey

S Hafeez, AR Khan, MM Al-Quraan… - IEEE Open Journal …, 2023 - ieeexplore.ieee.org
Unmanned aerial vehicles (UAVs) have recently established their capacity to provide cost-
effective and credible solutions for various real-world scenarios. UAVs provide an immense …

A Survey on Key Agreement and Authentication Protocol for Internet of Things Application

MK Hasan, Z Weichen, N Safie, FRA Ahmed… - IEEE …, 2024 - ieeexplore.ieee.org
The Internet of Things (IoT) represents a dynamic infrastructure, leveraging sensing and
network communication technology to establish ubiquitous connectivity among people …

Attribute-based encryption schemes for next generation wireless IoT networks: a comprehensive survey

Shruti, S Rani, DK Sah, G Gianini - Sensors, 2023 - mdpi.com
Most data nowadays are stored in the cloud; therefore, cloud computing and its extension—
fog computing—are the most in-demand services at the present time. Cloud and fog …

Image encryption algorithm combining chaotic image encryption and convolutional neural network

L Feng, J Du, C Fu, W Song - Electronics, 2023 - mdpi.com
With the rapid development of information technology, the security of images has emerged
as a significant area of research. This study presents an algorithm that integrates chaotic …

Enhancing image data security using the APFB model

K Barik, S Misra, LF Sanz, S Chockalingam - Connection Science, 2024 - Taylor & Francis
Ensuring the confidentiality of transmitting sensitive image data is paramount. Cryptography
recreates a critical function in safeguarding information from potential risks and confirming …

Novel area-efficient and flexible architectures for optimal Ate pairing on FPGA

O Azzouzi, M Anane, M Koudil, M Issad… - The Journal of …, 2024 - Springer
While FPGA is a suitable platform for implementing cryptographic algorithms, there are
several challenges associated with implementing Optimal Ate pairing on FPGA, such as …

A data lake-based security transmission and storage scheme for streaming big data

X Zhao, C Zhang, S Guan - Cluster Computing, 2024 - Springer
Streaming big data presents unique security challenges due to its real-time generation and
distributed transmission methods, making it vulnerable to security threats such as data …

[PDF][PDF] A comprehensive survey of threshold digital signatures: Nist standards, post-quantum cryptography, exotic techniques, and real-world applications

K Sedghighadikolaei, AA Yavuz - arXiv preprint arXiv:2311.05514, 2023 - researchgate.net
Threshold digital signatures enable a distributed execution of signature functionalities and
will play a crucial role in the security of emerging decentralized next-generation networked …

A hybrid approach for efficient and secure point multiplication on binary edwards curves

A Sajid, OS Sonbul, M Rashid, MYI Zia - Applied Sciences, 2023 - mdpi.com
The focus of this article is to present a novel crypto-accelerator architecture for a resource-
constrained embedded system that utilizes elliptic curve cryptography (ECC). The …

Towards a quantum-resilient future: Strategies for transitioning to post-quantum cryptography

A Aydeger, E Zeydan, AK Yadav… - … on Network of the …, 2024 - ieeexplore.ieee.org
The imminent emergence of quantum computers poses unprecedented challenges to the
current cryptographic standards that secure vital digital communications and data …