Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- ArticleOctober 2024
Efficient and Privacy-Preserving Multi-user, Multi-database and Multi-dimensional Range Query
AbstractThe rapid development of information technology relies on data. Both data analysis and calculation require data querying first. However, due to data privacy preservation concerns, outsourced data is generally encrypted, which brings more ...
- research-articleSeptember 2024
SL3PAKE: Simple Lattice-based Three-party Password Authenticated Key Exchange for post-quantum world
Journal of Information Security and Applications (JISA), Volume 84, Issue Chttps://doi.org/10.1016/j.jisa.2024.103826AbstractThree-party Password Authenticated Key Exchange (3PAKE) is a protocol where two parties generate the same session key with the help of a trusted server. With the evolution of quantum computers, there is a growing need to develop the 3PAKE ...
- research-articleAugust 2024
Recurrent neural networks-guided vector-valued synchronized key exchange for secure and privacy-preserving communication in Industrial Internet of Things
AbstractThis paper presents an innovative approach to the problem of key exchange in the Industrial Internet of Things (IIoT) implementation. Recurrent Neural Networks (RNNs) and vector-valued neural synchronization are the key components of the proposed ...
Highlights- Offers polynomial synchronization for RNNs to generate synchronized input vectors for ANN.
- Lyapunov formulas and inequality evaluation techniques to derive relevant control inputs and time-dependent conditions.
- Offers polynomial ...
- research-articleJuly 2024
OOBKey: Key Exchange with Implantable Medical Devices Using Out-Of-Band Channels
ARES '24: Proceedings of the 19th International Conference on Availability, Reliability and SecurityArticle No.: 191, Pages 1–13https://doi.org/10.1145/3664476.3670876Implantable Medical Devices (IMDs) are widely deployed today and often use wireless communication. Establishing a secure communication channel to these devices is challenging in practice. To address this issue, researchers have proposed IMD key exchange ...
- research-articleJuly 2024
Quantum-resistance blockchain-assisted certificateless data authentication and key exchange scheme for the smart grid metering infrastructure
Pervasive and Mobile Computing (PAMC), Volume 100, Issue Chttps://doi.org/10.1016/j.pmcj.2024.101919AbstractIn the contemporary landscape of energy infrastructure, the “smart-grid metering infrastructure (SGMI)” emerges as a pivotal entity for efficiently monitoring and regulating electricity generation in response to client behavior. Within this ...
-
- research-articleMarch 2024
Complex-valued hyperchaos-assisted vector-valued artificial neural key coordination for improving security in the Industrial Internet of Things
Engineering Applications of Artificial Intelligence (EAAI), Volume 128, Issue Chttps://doi.org/10.1016/j.engappai.2023.107561AbstractThis paper presents an innovative solution to the key exchange problem in the Industrial Internet of Things (IIoT) implementation. Communication between connected devices must be safe and effective if the IIoT is to continue its fast growth. A ...
- research-articleSeptember 2023
An Efficient Unique Tokenized Authentication Technique Based Data Offloading Approach Using Key Exchange to Maintain Data Integrity in Heterogeneous Networks
AbstractIn the current period, the number of mobile users is rapidly expanding with a complicated network setup with a large amount of network traffic, which results in data overload. Insufficient network bandwidth causes data overloading. Data ...
- research-articleSeptember 2023
An improved authentication and key management scheme in context of IoT-based wireless sensor network using ECC
Computer Communications (COMS), Volume 209, Issue CPages 47–62https://doi.org/10.1016/j.comcom.2023.06.017AbstractWireless sensor network (WSN) is used for sensing data/information from the nearby environment with the help of various spatially dispersed miniature sensor devices/nodes and forwarding the data to the direction of the base station ...
- research-articleMay 2023
A computationally efficient and randomized RLWE-based key exchange scheme
Cluster Computing (KLU-CLUS), Volume 27, Issue 2Pages 1599–1610https://doi.org/10.1007/s10586-023-04032-8AbstractKey exchange enables two or more entities to agree on an identical key. In post-quantum, the construction of ring learning with error (RLWE) based key exchange provides a strong provable secure, and efficient solution. The resistance against ...
- research-articleMay 2023
Towards secure asynchronous messaging with forward secrecy and mutual authentication
Information Sciences: an International Journal (ISCI), Volume 626, Issue CPages 114–132https://doi.org/10.1016/j.ins.2023.01.052Highlights- The proposed puncturable identity-based matchmaking key encapsulation mechanism (PIB-MKEM) enables a receiver to revoke his decapsulation capacity ...
Instant messaging applications like WhatsApp and iMessage have been widely used to exchange public and private information for both individuals and organizations. At the same time, the asynchronicity nature of these applications also ...
- research-articleApril 2023
Lightweight and authentic symmetric session key cryptosystem for client–server mobile communication
The Journal of Supercomputing (JSCO), Volume 79, Issue 14Pages 16181–16205https://doi.org/10.1007/s11227-023-05239-7AbstractOver the last decade, millions of 4G and 5G-enabled mobile devices have become part of the Internet. Almost, all the applications have been shifted to smartphones. A person connects his smartphone to several other devices or remote servers for ...
- research-articleNovember 2022
An FPGA-Based Performance Evaluation of Artificial Neural Network Architecture Algorithm for IoT
- Arthur A. M. Teodoro,
- Otávio S. M. Gomes,
- Muhammad Saadi,
- Bruno A. Silva,
- Renata L. Rosa,
- Demóstenes Z. Rodríguez
Wireless Personal Communications: An International Journal (WPCO), Volume 127, Issue 2Pages 1085–1116https://doi.org/10.1007/s11277-021-08566-1AbstractNowadays, the high number of devices and applications connected to the Internet has generated a great amount of data being which makes privacy and protection a more challenging task. In addition, new technologies, such as the Internet of Things, ...
- ArticleSeptember 2022
Light the Signal: Optimization of Signal Leakage Attacks Against LWE-Based Key Exchange
AbstractKey exchange protocols from the learning with errors (LWE) problem share many similarities with the Diffie-Hellman-Merkle (DHM) protocol, which plays a central role in securing our Internet. Therefore, there has been a long time effort in ...
- research-articleMay 2022
A new framework for deniable secure key exchange
AbstractA deniable secure key exchange protocol allows two parties to agree on a common secret while achieving two seemingly contradictory functionalities: authentication and deniability. The former requires each party to confirm the identity of the ...
- research-articleMarch 2022
An efficient authentication with key agreement procedure using Mittag–Leffler–Chebyshev summation chaotic map under the multi-server architecture
- Chandrashekhar Meshram,
- Rabha W. Ibrahim,
- Sarita Gajbhiye Meshram,
- Sajjad Shaukat Jamal,
- Agbotiname Lucky Imoize
The Journal of Supercomputing (JSCO), Volume 78, Issue 4Pages 4938–4959https://doi.org/10.1007/s11227-021-04039-1AbstractThe recent technological advancement and rapid development of computer networks have increased the popularity of remote password authentication protocols. Toward this end, the emphasis has shifted to protocols that apply to smart cards-empowered ...
- research-articleJanuary 2022
Post-quantum lightweight identity-based two-party authenticated key exchange protocol for Internet of Vehicles with probable security
Computer Communications (COMS), Volume 181, Issue CPages 69–79https://doi.org/10.1016/j.comcom.2021.09.031AbstractWith Internet of Things (IoT) growing rapidly, the Internet of Vehicles (IoV) has become an essential part of smart cities and has attracted the full attention of both academic and business communities. Because of the public ...
- posterNovember 2021
Key Exchange and Management Schemes for Automotive Control Units
EICC '21: Proceedings of the 2021 European Interdisciplinary Cybersecurity ConferencePages 89–90https://doi.org/10.1145/3487405.3487658Today's vehicles are typically equipped with dozens of electronic control units that control one or more of the electrical systems or subsystems. Due to the rapid development towards autonomous driving, vehicle functionalities strongly depend on the ...
- ArticleOctober 2021
Improved Attacks Against Key Reuse in Learning with Errors Key Exchange
AbstractBasic key exchange protocols built from the learning with errors (LWE) assumption are insecure if secret keys are reused in the face of active attackers. One example of this is Fluhrer’s attack on the Ding, Xie, and Lin (DXL) LWE key exchange ...
- research-articleOctober 2021
Secure and Efficient Key Exchange Mechanism for Heterogeneous Connected Objects
Wireless Personal Communications: An International Journal (WPCO), Volume 120, Issue 4Pages 2631–2652https://doi.org/10.1007/s11277-021-08549-2AbstractThe fast evolution in microelectronics and the emergence of wireless communication technologies, have allowed the appearance of the promising field of Internet of Things (IoT). The latter is more and more present in the human life, that is why it ...