Search
Search Results
-
Securing polynomial based group key management scheme against strong active adversary model
The literature on group key management focuses solely on the security of schemes under passive adversary model. But they lack security against a more...
-
Proving the (In)Security of CRT Based Key Management Schemes Under SAOA Model
There have been several proposed methods in the literature for securely distributing group keys and managing group dynamics for secure group...
-
Examining Insider-Outsider Dynamics
Nationality is a category used by Zimbabweans strategically in order to seek self-esteem and positive affirmation as migrants in a foreign land, and... -
The Pre-Shared Key Modes of HPKE
The Hybrid Public Key Encryption (HPKE) standard was recently published as RFC 9180 by the Crypto Forum Research Group (CFRG) of the Internet... -
Group Key Management Schemes Under Strong Active Adversary Model: A Security Analysis
A group key management scheme is for a group controller to manage an encryption key for a collection of users to communicate messages among... -
Bitcoin as a Transaction Ledger: A Composable Treatment
Bitcoin is one of the most prominent examples of a distributed cryptographic protocol that is extensively used in reality. Nonetheless, existing...
-
A Lightweight PUF based Multi-factor Authentication Technique for Intelligent Smart Healthcare System
The Internet of Things is gaining popularity throughout the world. With the growth of digital communication, healthcare 4.0 are being implemented by...
-
Lessons learned from offline assessment of security-critical systems: the case of microsoft’s active directory
One of the famous directory services on the market is Active Directory (AD) by Microsoft. It consists of a set of services that work on Windows...
-
Confirming Secure Interoperability in Mobile Financial Services: Challenges of Data Federation and Cryptography-Based Solution
Mobile Financial Services (MFS) is a very promising and prospering sector in Bangladesh with emerging challenges. Currently, each MFS providers is... -
End-to-End Encrypted Zoom Meetings: Proving Security and Strengthening Liveness
In May 2020, Zoom Video Communications, Inc. (Zoom) announced a multi-step plan to comprehensively support end-to-end encrypted (E2EE) group video... -
Security Analysis of Group Key Management Schemes in Wireless Sensor Networks Against IND-SAOA Game
In the literature, several group key management (GKM) schemes have been proposed and reviewed against passive adversary to analyze the important...
-
Multi-Signatures for Ad-Hoc and Privacy-Preserving Group Signing
Multi-signatures allow to combine individual signatures from different signers on the same message into a short aggregated signature. Newer schemes... -
Federated learning for 6G-enabled secure communication systems: a comprehensive survey
Machine learning (ML) and Deep learning (DL) models are popular in many areas, from business, medicine, industries, healthcare, transportation, smart...
-
Development and analysis of attack-resilient three party authenticated key agreement scheme based on chaotic maps for secure communication
The three party authenticated key agreement protocol assists two parties in affirming one another and agreeing on a shared session key with the...
-
Authenticated key agreement scheme for IoT networks exploiting lightweight linear algebraic computations
Internet of Things (IoT) applications consist mainly of a group of small devices with sensing and/ or actuation capabilities, working collaboratively...
-
Lightweight secure authentication and key agreement technique for smart grid
In the last decade, complex engineering systems have been made automatic, smart, and intelligent by adding computation, communication, and monitoring...
-
Data Sharing and Privacy Preserving Access Policy of Cloud Computing Using Security
People admire the incredible power of cloud computing but cannot fully trust on cloud providers due to the absence of user-to-cloud controllability.... -
CASE: A New Frontier in Public-Key Authenticated Encryption
We introduce a new cryptographic primitive, called Completely Anonymous Signed Encryption (CASE). CASE is a public-key authenticated encryption... -
Robust Rabin Cryptosystem Biometric Privacy Preserving Authentication Technique for IoT Enabled Devices Over Cloud
With the advent of growing technologies and digitalization, smart factories and healthcare systems in the cloud are more focused towards task-driven...
-
From Religious Populism to Civil Religion: a Discourse Analysis of Bolsonaro’s and Lula’s Inaugural and Victory Speeches
Religion played a major role during the presidential elections in Brazil in 2018 and 2022. Although much has been written about Bolsonaro’s religious...