5G In the internet of things era: An overview on security and privacy challenges

S Sicari, A Rizzardi, A Coen-Porisini - Computer Networks, 2020 - Elsevier
Now reaching 2020, the world is witnessing the initial diffusion of 5G networks, which
promise to revolutionize the mobile wireless communications, providing faster services, very …

[图书][B] Protocols for authentication and key establishment

C Boyd, A Mathuria, D Stebila - 2003 - Springer
The first edition of this book was published in 2003. Inevitably, certain parts of the book
became outdated quickly. At the same time new developments have continued apace …

Scalable protocols for authenticated group key exchange

J Katz, M Yung - Annual international cryptology conference, 2003 - Springer
We consider the fundamental problem of authenticated group key exchange among n
parties within a larger and insecure public network. A number of solutions to this problem …

Secure device pairing: A survey

S Mirzadeh, H Cruickshank… - … Surveys & Tutorials, 2013 - ieeexplore.ieee.org
In this paper, we discuss secure device pairing mechanisms in detail. We explain man-in-the-
middle attack problem in unauthenticated Diffie-Hellman key agreement protocols and show …

Scalable protocols for authenticated group key exchange

J Katz, M Yung - Journal of Cryptology, 2007 - Springer
We consider the problem of authenticated group key exchange among n parties
communicating over an insecure public network. A number of solutions to this problem have …

Provably secure constant round contributory group key agreement in dynamic setting

R Dutta, R Barua - IEEE Transactions on Information Theory, 2008 - ieeexplore.ieee.org
In this paper, we present and analyze a variant of Burmester-Desmedt group key agreement
protocol (BD) and enhance it to dynamic setting where a set of users can leave or join the …

Password-based group key exchange in a constant number of rounds

M Abdalla, E Bresson, O Chevassut… - Public Key Cryptography …, 2006 - Springer
With the development of grids, distributed applications are spread across multiple computing
resources and require efficient security mechanisms among the processes. Although …

[图书][B] Security in RFID and sensor networks

P Kitsos - 2016 - taylorfrancis.com
In the past several years, there has been an increasing trend in the use of Radio Frequency
Identification (RFID) and Wireless Sensor Networks (WSNs) as well as in the integration of …

Fibonacci based key frame selection and scrambling for video watermarking in DWT–SVD domain

S Ponni alias Sathya, S Ramakrishnan - Wireless Personal …, 2018 - Springer
Video copyright is the technique for hiding sensitive data in digital video. This paper aims to
introduce a new technique for video copyright namely Fibonacci based keyframe selection …

Mitigating the desynchronisation attack in multiserver environment

SU Jan, F Qayum - IET Communications, 2020 - Wiley Online Library
Currently, every user outsources a huge amount of shared secrets remotely from different
servers and utilises synchrony resources. To make all types of operations secure for the end …