Self-adaptive and content-based scheduling for reducing idle listening and overhearing in securing quantum IoT sensors

MN Khan, I Khalil, I Ullah, SK Singh, S Dhahbi, H Khan… - Internet of Things, 2024 - Elsevier
Today is the age of superconductivity where each object connects in a cascading manner to
other objects, allowing for seamless integration of real-world objects into the digital domain …

Enabling secure and trustworthy quantum networks: current state-of-the-art, key challenges, and potential solutions

S Bajrić - IEEE Access, 2023 - ieeexplore.ieee.org
Quantum networks hold the promise of enabling secure and trustworthy communication and
computation. However, they also pose significant challenges in terms of security, privacy …

Quantum stream cipher based on Holevo–Yuen theory

M Sohma, O Hirota - Entropy, 2022 - mdpi.com
In this review paper, we first introduce the basic concept of quantum computer-resistant
cryptography, which is the cornerstone of security technology for the network of a new era …

A new lattice-based password authenticated key exchange scheme with anonymity and reusable key

K Seyhan, S Akleylek - PeerJ Computer Science, 2024 - peerj.com
In this article, we propose a novel bilateral generalization inhomogenous short integer
solution (BiGISIS)-based password-authenticated key exchange (PAKE) scheme for post …

Combining Decentralized IDentifiers with Proof of Membership to Enable Trust in IoT Networks

A Pino, D Margaria, A Vesco - 2023 33rd International …, 2023 - ieeexplore.ieee.org
The Self-Sovereign Identity (SSI) is a decentralized paradigm enabling full control over the
data used to build and prove the identity. In Internet of Things networks with security …

Cryptography in business intelligence and data analytics

MA Al Khaldy, A Ishtaiwi, A Al-Qerem… - Innovations in Modern …, 2024 - igi-global.com
This chapter aims to determine the role of cryptography in the provision of secure
applications of business intelligence and data analytics. Through this, the legal implications …

Cybersecurity in the Quantum Era: Assessing the Impact of Quantum Computing on Infrastructure

Y Baseri, V Chouhan, A Ghorbani - arXiv preprint arXiv:2404.10659, 2024 - arxiv.org
The emergence of quantum computing presents a double-edged sword for cybersecurity.
While its immense power holds promise for advancements in various fields, it also threatens …

QuantIoT Novel Quantum Resistant Cryptographic Algorithm for Securing IoT Devices: Challenges and Solution

M Farooq, MH Khan - 2023 - researchsquare.com
With the emergence of quantum computing, traditional cryptographic algorithms face the
threat of being compromised, necessitating the development of quantum-resistant …

A Survey of Cryptographic Algorithms in Cybersecurity: From Classical Methods to Quantum-Resistant Solutions

SN Tambe-Jagtap - SHIFRA, 2023 - peninsula-press.ae
As quantum computing technology evolves, it poses greater risks to current cryptography
schemes such as RSA and Elliptic Curve Cryptography (ECC), widely used to secure digital …

[PDF][PDF] A Quantum-Secure Cryptographic Algorithm Integrating Fractals and Prime Numbers

G Iovane, E Benedetto, A Di Lauro - Applied Sciences, 2024 - inspirehep.net
The present work introduces a new scheme of data cryptography in the context of emerging
trends due to the challenge of defending critical network infrastructure against new exploit …