A construction of post quantum secure and signal leakage resistant authenticated key agreement protocol for mobile communication

U Kumar, M Garg, S Kumari… - Transactions on …, 2023 - Wiley Online Library
Mobile communication is very important for an individual users, enterprisers, industries,
businesses, and organizations. Since the nodes communicate through a public channel …

An efficient certificateless signature scheme with provably security and its applications

K Ma, Y Zhou, Y Wang, C Dong, Z Xia… - IEEE Systems …, 2023 - ieeexplore.ieee.org
The Internet of Things (IoT) is helpful in making people's life more convenient and efficient.
To ensure that the nodes within IoT can interact securely, a certificateless signature (CLS) …

Trustworthy and efficient digital twins in post-quantum era with hybrid hardware-assisted signatures

SE Nouma, AA Yavuz - ACM Transactions on Multimedia Computing …, 2024 - dl.acm.org
Digital Twins (DT) virtually model cyber-physical objects via sensory inputs by simulating or
monitoring their behavior. Therefore, DTs usually harbor vast quantities of Internet of Things …

Efficient and Privacy-Preserving Cloud-Assisted Two-Party Computation Scheme in Heterogeneous Networks

Z Liu, L Wang, H Bao, Z Cao, L Zhou… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
Prevailing smart devices collect individual or industrial sensitive data for collaborative
computation to provide convenient service in heterogeneous networks. Nowadays …

A dynamic and multi-level key management method in wireless sensor networks (WSNs)

SA Khah, A Barati, H Barati - Computer Networks, 2023 - Elsevier
Wireless sensor networks include a set of ultralight sensor nodes with limited energy, low
storage capacity, and constrained processing power. Security is a challenging issue in these …

Agile: Automated assertion generation to detect information leakage vulnerabilities

NF Dipu, A Ayalasomayajula… - IEEE Transactions …, 2023 - ieeexplore.ieee.org
The globalization of the System-on-Chip (SoC) design process has made hardware designs
prone to many security vulnerabilities. One of the most critical security vulnerabilities is …

QPause: Quantum-Resistant Password-Protected Data Outsourcing for Cloud Storage

J Jiang, D Wang, G Zhang - IEEE Transactions on Services …, 2023 - ieeexplore.ieee.org
Cloud storage provides an efficient and convenient way to manage data, but it also poses
significant challenges to data security. The central issue with cloud storage is to ensure the …

Sea: Secure and efficient public auditing for edge-assisted IoT aggregated data sharing

M Liu, N Lu, Y Wen, Q Cheng, W Shi - Mobile Networks and Applications, 2023 - Springer
With the increasing deployment of sensors and the consequent rise in IoT data, it is prudent
for system administrators to adopt data aggregation strategies in edge-assisted IoT …

Generic Construction: Cryptographic Reverse Firewalls for Public Key Encryption with Keyword Search in Cloud Storage

Y Ming, H Liu, C Wang, Y Zhao - IEEE Transactions on Cloud …, 2024 - ieeexplore.ieee.org
The Snowden incident illustrates that an adversary may launch an algorithm substitution
attack (ASA) by tampering with the algorithms of protocol participants to obtain users' secret …

A key escrow-free KP-ABE scheme and its application in stand-alone authentication in IoT

X He, L Li, H Peng - IEEE Internet of Things Journal, 2023 - ieeexplore.ieee.org
When users access the Internet of Things (IoT) devices, authenticating their identities and
permissions is an important measure to ensure system security and achieve access control …