A roadmap from classical cryptography to post-quantum resistant cryptography for 5G-enabled IoT: Challenges, opportunities and solutions

D Chawla, PS Mehra - Internet of Things, 2023 - Elsevier
Abstract 5th Generation (5G)-enabled Internet of Things (IoT) connects billions of devices for
high-speed data transfer. The data collected fuel many automation applications such as …

Current status and security trend of osint

YW Hwang, IY Lee, H Kim, H Lee… - … and Mobile Computing, 2022 - Wiley Online Library
Recently, users have used open‐source intelligence (OSINT) to gather and obtain
information regarding the data of interest. The advantage of using data gathered by OSINT is …

Design of secure mutual authentication scheme for metaverse environments using blockchain

J Ryu, S Son, J Lee, Y Park, Y Park - Ieee Access, 2022 - ieeexplore.ieee.org
During the COVID-19 pandemic, engagement in various remote activities such as online
education and meetings has increased. However, since the conventional online …

An authentication-based secure data aggregation method in internet of things

M Ataei Nezhad, H Barati, A Barati - Journal of Grid Computing, 2022 - Springer
Abstract Internet of Things (IoT) means connecting different devices through the Internet. The
Internet of things enables humans to remotely manage and control the objects they use with …

A robust privacy-preserving ecc-based three-factor authentication scheme for metaverse environment

G Thakur, P Kumar, CM Chen, AV Vasilakos… - Computer …, 2023 - Elsevier
Metaverse is revolutionizing the future iteration of technology with the potential to ameliorate
efficiency and innovation drastically. It fashions engaging spaces for user interaction that …

Secure and privacy-preserving authentication scheme using decentralized identifier in metaverse environment

M Kim, J Oh, S Son, Y Park, J Kim, Y Park - Electronics, 2023 - mdpi.com
The metaverse provides a virtual world with many social activities that parallel the real world.
As the metaverse attracts more attention, the importance of security and privacy preservation …

Public key versus symmetric key cryptography in client–server authentication protocols

A Braeken - International Journal of Information Security, 2022 - Springer
Every month, several new protocols are popping up, comparing themselves with a few
others and claiming to outperform the whole state of the art. The most popular domain of …

Current research trends in IoT security: a systematic mapping study

JY Lee, J Lee - Mobile Information Systems, 2021 - Wiley Online Library
The smart mobile Internet‐of‐things (IoT) network lays the foundation of the fourth industrial
revolution, the era of hyperconnectivity, hyperintelligence, and hyperconvergence. As this …

Enhancing user prompt confidentiality in Large Language Models through advanced differential encryption

BB Gupta, A Gaurav, V Arya, W Alhalabi… - Computers and …, 2024 - Elsevier
In the era of artificial intelligence (AI) advancements heralded by Large Language Models
(LLMs) like GPT-3, the capacity to parse and generate human-like text brings to light …

A secure elliptic curve based anonymous authentication and key establishment mechanism for IoT and cloud

AK Singh, A Nayyar, A Garg - Multimedia Tools and Applications, 2023 - Springer
With the increased number of smart devices in IoT and cloud, communication messages are
exchanged extensively throughout the network. This requires secure data transfer between …