Blockchain-assisted UAV communication systems: A comprehensive survey
Unmanned aerial vehicles (UAVs) have recently established their capacity to provide cost-
effective and credible solutions for various real-world scenarios. UAVs provide an immense …
effective and credible solutions for various real-world scenarios. UAVs provide an immense …
A Survey on Key Agreement and Authentication Protocol for Internet of Things Application
The Internet of Things (IoT) represents a dynamic infrastructure, leveraging sensing and
network communication technology to establish ubiquitous connectivity among people …
network communication technology to establish ubiquitous connectivity among people …
Attribute-based encryption schemes for next generation wireless IoT networks: a comprehensive survey
Most data nowadays are stored in the cloud; therefore, cloud computing and its extension—
fog computing—are the most in-demand services at the present time. Cloud and fog …
fog computing—are the most in-demand services at the present time. Cloud and fog …
Image encryption algorithm combining chaotic image encryption and convolutional neural network
With the rapid development of information technology, the security of images has emerged
as a significant area of research. This study presents an algorithm that integrates chaotic …
as a significant area of research. This study presents an algorithm that integrates chaotic …
Enhancing image data security using the APFB model
Ensuring the confidentiality of transmitting sensitive image data is paramount. Cryptography
recreates a critical function in safeguarding information from potential risks and confirming …
recreates a critical function in safeguarding information from potential risks and confirming …
Novel area-efficient and flexible architectures for optimal Ate pairing on FPGA
While FPGA is a suitable platform for implementing cryptographic algorithms, there are
several challenges associated with implementing Optimal Ate pairing on FPGA, such as …
several challenges associated with implementing Optimal Ate pairing on FPGA, such as …
A data lake-based security transmission and storage scheme for streaming big data
X Zhao, C Zhang, S Guan - Cluster Computing, 2024 - Springer
Streaming big data presents unique security challenges due to its real-time generation and
distributed transmission methods, making it vulnerable to security threats such as data …
distributed transmission methods, making it vulnerable to security threats such as data …
[PDF][PDF] A comprehensive survey of threshold digital signatures: Nist standards, post-quantum cryptography, exotic techniques, and real-world applications
K Sedghighadikolaei, AA Yavuz - arXiv preprint arXiv:2311.05514, 2023 - researchgate.net
Threshold digital signatures enable a distributed execution of signature functionalities and
will play a crucial role in the security of emerging decentralized next-generation networked …
will play a crucial role in the security of emerging decentralized next-generation networked …
A hybrid approach for efficient and secure point multiplication on binary edwards curves
The focus of this article is to present a novel crypto-accelerator architecture for a resource-
constrained embedded system that utilizes elliptic curve cryptography (ECC). The …
constrained embedded system that utilizes elliptic curve cryptography (ECC). The …
Towards a quantum-resilient future: Strategies for transitioning to post-quantum cryptography
The imminent emergence of quantum computers poses unprecedented challenges to the
current cryptographic standards that secure vital digital communications and data …
current cryptographic standards that secure vital digital communications and data …