Search
Search Results
-
The GMW MPC Protocol
All the MPC protocols discussed so far offer perfect-security against computationally-unbounded adversaries. For the next few chapters, we shift our... -
Block-Privacy: Privacy Preserving Smart Healthcare Framework: Leveraging Blockchain and Functional Encryption
Early adoption of Internet of Medical Things (IoMT) are enhancing the healthcare sector in all directions. Though the advances are adding advantages... -
KEP: Keystroke Evoked Potential for EEG-Based User Authentication
In recent years, the rapid proliferation of Brain-Computer Interface (BCI) applications has made the issue of security increasingly important. User... -
Private Set Operations from Multi-query Reverse Private Membership Test
Private set operations allow two parties to perform secure computation on their private sets, including intersection, union and functions of... -
A survey on IoT application layer protocols, security challenges, and the role of explainable AI in IoT (XAIoT)
The Internet of Things (IoT) plays a fundamental role in contemporary society, necessitating an in-depth comprehension of its application layer...
-
Fog computing in enabling 5G-driven emerging technologies for development of sustainable smart city infrastructures
The usage of 5G-enabled IoT devices is rising exponentially as humans tend to shift towards a more automated lifestyle. A significant amount of IoT...
-
A Survey on Delegated Computation
In the area of delegated computation, the main problem asks how a computationally weaker client device can obtain help from one or more... -
An Introduction to Classical and Modern Cryptography
The remote environment bounded us to share information, documents, money, etc. with the help of applications, devices, and tools. The information,... -
Industrial Internet of Things (IIoT) Applications of Edge and Fog Computing: A Review and Future Directions
With rapid technological advancements within the domain of Internet of Things (IoT), strong trends have emerged which indicate rapid growth in the... -
Privacy and data protection in the enterprise world
Enterprise systems are becoming more complex with an interconnected network of large heterogeneous devices. These systems generate, process and store...
-
Applicable image cryptosystem using bit-level permutation, particle swarm optimisation, and quantum walks
Digital data plays a paramount part in various fields of life, in which multimedia data represent the majority of transferred digital data via...
-
Enhancing biometric authentication security through the novel integration of graph theory encryption and chaotic logistic map**
The escalating reliance on biometric systems for identity verification underscores the imperative for robust data protection mechanisms. Biometric...
-
Characterizing Privacy Risks in Healthcare IoT Systems
The advancement in Internet of Things (IoT) technology has been having a huge societal and economic impact, effectively changing the paradigms in... -
On the Related-Key Attack Security of Authenticated Encryption Schemes
Related-key attacks (RKA) are powerful cryptanalytic attacks, where the adversary can tamper with the secret key of a cryptographic scheme. Since... -
Laying the Foundation: Pixels, Logic, and Data Streams
As we peel back the layers of sophisticated software applications, a harmonious interplay between various components becomes apparent. In this... -
Quantum-Resistant Software Update Security on Low-Power Networked Embedded Devices
As the Internet of Things (IoT) rolls out today to devices whose lifetime may well exceed a decade, conservative threat models should consider... -
Efficient Forward Secrecy for TLS-PSK from Pure Symmetric Cryptography
Transport layer security (TLS) is by far the most important protocol on the Internet for establishing secure session keys and providing... -
Secure cloud-based mobile apps: attack taxonomy, requirements, mechanisms, tests and automation
The adoption and popularization of mobile devices, such as smartphones and tablets, accentuated after the second decade of this century, has been...
-
MESSB–LWE: multi-extractable somewhere statistically binding and learning with error-based integrity and authentication for cloud storage
The concept of cloud envisioned cyber-physical systems is a practical technology that allows users to interact with each other while transferring...
-
An Innovative Blockchain-Based Orchestrator for Osmotic Computing
In the last decade, the increasing number of devices connected to the internet has allowed the development of new technologies for distributed...