Elliptic Curve Cryptography; Applications, challenges, recent advances, and future trends: A comprehensive survey

S Ullah, J Zheng, N Din, MT Hussain, F Ullah… - Computer Science …, 2023 - Elsevier
Elliptic Curve (EC) is the most recent and advanced technique of Elliptic Curve
Cryptography (ECC). EC is often used to improve the security of open communication …

Robotics cyber security: Vulnerabilities, attacks, countermeasures, and recommendations

JPA Yaacoub, HN Noura, O Salman… - International Journal of …, 2022 - Springer
The recent digital revolution led robots to become integrated more than ever into different
domains such as agricultural, medical, industrial, military, police (law enforcement), and …

20 years of Electronic Commerce Research

S Kumar, WM Lim, N Pandey… - Electronic Commerce …, 2021 - Springer
Abstract 2021 marks the 20th anniversary of the founding of Electronic Commerce Research
(ECR). The journal has changed substantially over its life, reflecting the wider changes in the …

An elliptic curve cryptography based lightweight authentication scheme for smart grid communication

K Mahmood, SA Chaudhry, H Naqvi, S Kumari… - Future Generation …, 2018 - Elsevier
An evolved grid system, Smart Grid, enables appropriate adjustments in the amount of
electricity generation by providing the capability to monitor the consumption behavior of …

A lightweight message authentication scheme for smart grid communications in power sector

K Mahmood, SA Chaudhry, H Naqvi, T Shon… - Computers & Electrical …, 2016 - Elsevier
Abstract The Internet of Things (IoT) has plenty of applications including Smart Grid (SG). IoT
enables smooth and efficient utilization of SG. It is assumed as the prevalent illustration of …

Utilising VAPT Technologies (Vulnerability Assessment & Penetration Testing) as a Method for Actively Preventing Cyberattacks

VV Vegesna - International Journal of Management, Technology …, 2023 - papers.ssrn.com
Complexity of systems are increasing day by day. This leads to more and more
vulnerabilities in Systems. Attackers use these vulnerabilities to exploit the victim's system. It …

Disentangling features in 3D face shapes for joint face reconstruction and recognition

F Liu, R Zhu, D Zeng, Q Zhao… - Proceedings of the IEEE …, 2018 - openaccess.thecvf.com
This paper proposes an encoder-decoder network to disentangle shape features during 3D
face shape reconstruction from single 2D images, such that the tasks of learning …

Towards a cashless society: The effects of perceived convenience and security on gamified mobile payment platform adoption

PC Lai, EJY Liew - Australasian Journal of Information …, 2021 - research.monash.edu
Integrating gamification into mobile payment platforms incentivizes people to use digital
alternatives for payment and could spur user-centric, platform-mediated interactions. This …

An improved and provably secure privacy preserving authentication protocol for SIP

SA Chaudhry, H Naqvi, M Sher, MS Farash… - Peer-to-Peer Networking …, 2017 - Springer
Abstract Session Initiation Protocol (SIP) has proved to be the integral part and parcel of any
multimedia based application or IP-based telephony service that requires signaling. SIP …

A review on electronic payments security

MA Hassan, Z Shukur, MK Hasan, AS Al-Khaleefa - Symmetry, 2020 - mdpi.com
Modern technology is turning into an essential element in the financial trade. We focus the
emphasis of this review on the research on the E-wallet and online payment, which is an …