Counter denial of service for next-generation networks within the artificial intelligence and post-quantum era
Given the rise in cyber threats to networked systems, coupled with the proliferation of AI
techniques and enhanced processing capabilities, Denial of Service (DoS) attacks are …
techniques and enhanced processing capabilities, Denial of Service (DoS) attacks are …
Efficient implementations of CRAFT cipher for Internet of Things
J Xiang, L Li - Computers and Electrical Engineering, 2024 - Elsevier
The rapid growth of the Internet of Things (IoT) highlights the importance of lightweight
cryptography in maintaining security. However, enhancing performance while ensuring the …
cryptography in maintaining security. However, enhancing performance while ensuring the …
PQC meets ML or AI: Exploring the Synergy of Machine Learning and Post-quantum Cryptography
Artificial Intelligence and Machine Learning are widely integrated into real-world
applications, facing security and privacy risks. The emergence of quantum computers poses …
applications, facing security and privacy risks. The emergence of quantum computers poses …
Fast and Post-Quantum Authentication for Real-time Next Generation Networks with Bloom Filter
K Sedghighadikolaei, AA Yavuz - arXiv preprint arXiv:2409.10813, 2024 - arxiv.org
Large-scale next-generation networked systems like smart grids and vehicular networks
facilitate extensive automation and autonomy through real-time communication of sensitive …
facilitate extensive automation and autonomy through real-time communication of sensitive …
Privacy-Preserving and Post-Quantum Counter Denial of Service Framework for Wireless Networks
As network services progress and mobile and IoT environments expand, numerous security
concerns have surfaced for spectrum access systems. The omnipresent risk of Denial-of …
concerns have surfaced for spectrum access systems. The omnipresent risk of Denial-of …
Scalable and Lightweight Post-Quantum Authentication for Internet of Things
Internet of Things (IoT) applications are composed of massive quantities of resource-limited
devices that collect sensitive data with long-term operational and security requirements. With …
devices that collect sensitive data with long-term operational and security requirements. With …
Exploration of PQC-Based Digital Signature Schemes in TLS Certificates
MU Khan, M Ashraf, T Rehman, MAR Javaid… - The Asian Bulletin of …, 2024 - abbdm.com
The rapid development in quantum computers brings huge risks to traditional cryptographic
systems. This paper talks about the integration of PQC-based digital signature schemes to …
systems. This paper talks about the integration of PQC-based digital signature schemes to …
On the trade‐off between rate and reliability for secret key generation in wireless channels
M Sandell - Security and Privacy - Wiley Online Library
Wireless propagation channels can be used to obtain secret keys to enhance security. By
exploiting the reciprocity of the channel between legitimate users and its independence of …
exploiting the reciprocity of the channel between legitimate users and its independence of …
[PDF][PDF] Lightweight and Scalable Post-Quantum Authentication for Medical Internet of Things
ABSTRACT The Medical Internet of Things (MIoT) harbors resource-limited medical
embedded devices that collect security-sensitive data from users for analysis, monitoring …
embedded devices that collect security-sensitive data from users for analysis, monitoring …