All Stories

  1. Application of BukaGini algorithm for enhanced feature interaction analysis in intrusion detection systems
  2. A Systematic Survey of Machine Learning and Deep Learning Models Used in Industrial Internet of Things Security
  3. A Systematic Literature Review on Host-Based Intrusion Detection Systems
  4. SoK of Machine Learning and Deep Learning based Anomaly Detection Methods for Automatic Dependent Surveillance-Broadcast
  5. Modified graph-based algorithm to analyze security threats in IoT
  6. A new method for vulnerability and risk assessment of IoT
  7. Kyber, Saber, and SK-MLWR Lattice-Based Key Encapsulation Mechanisms Model Checking with Maude
  8. A new hybrid method combining search and direct based construction ideas to generate all 4 × 4 involutory maximum distance separable (MDS) matrices over binary field extensions
  9. Handbook of Formal Analysis and Verification in Cryptography
  10. Indistinguishability under adaptive chosen-ciphertext attack secure double-NTRU-based key encapsulation mechanism
  11. Attack Path Detection for IIoT Enabled Cyber Physical Systems: Revisited
  12. A survey of quantum secure group signature schemes: Lattice-based approach
  13. Group Key Management in Internet of Things: A Systematic Literature Review
  14. MLWR-2PAKA: A Hybrid Module Learning With Rounding-Based Authenticated Key Agreement Protocol for Two-Party Communication
  15. On the Construction of New Lightweight Involutory MDS Matrices in Generalized Subfield Form
  16. Formal analysis of Post-Quantum Hybrid Key Exchange SSH Transport Layer Protocol
  17. Classification of random number generator applications in IoT: A comprehensive taxonomy
  18. Mobil Cihazların Kuantum Sonrası Güvenliği İçin Uyarlanmış KEM Uygulamaları: Adapted KEM Applications for Post-Quantum Security of Mobile Devices
  19. SSIM Modelin Geliştirilmesine Dayanan Bir 3B Video Kalite Değerlendirme Metriği
  20. Bulut Bilişim Güvenliği İçin Kullanılan Makine Öğrenimi Yöntemleri Üzerine Bir Derleme
  21. A new lattice-based authentication scheme for IoT
  22. Module learning with rounding based key agreement scheme with modified reconciliation
  23. LinRegDroid: Detection of Android Malware Using Multiple Linear Regression Models-Based Classifiers
  24. On the Construction Structures of $$3 \times 3$$ Involutory MDS Matrices over $$\mathbb {F}_{2^{m}}$$
  25. Quantum Secure Communication Between Service Provider and Sim
  26. Permission-based Android malware analysis by using dimension reduction with PCA and LDA
  27. Lattice-based cryptosystems for the security of resource-constrained IoT devices in post-quantum world: a survey
  28. Efficient Implementations of Sieving and Enumeration Algorithms for Lattice-Based Cryptography
  29. Bi-GISIS KE: Modified key exchange protocol with reusable keys for IoT security
  30. Novel Postquantum MQ-Based Signature Scheme for Internet of Things With Parallel Implementation
  31. A novel IoT-based health and tactical analysis model with fog computing
  32. A RESEARCH ON INDOOR POSITIONING SYSTEMS
  33. NESNELERİN İNTERNETİ TABANLI SAĞLIK İZLEME SİSTEMLERİ ÜZERİNE BİR ÇALIŞMA
  34. Parola Tabanlı SIMSec Protokolü
  35. Parallel implementation of Nussbaumer algorithm and number theoretic transform on a GPU platform: application to qTESLA
  36. MaTRU-KE revisited: CCA2-secure key establishment protocol based on MaTRU
  37. On the automorphisms and isomorphisms of MDS matrices and their efficient implementations
  38. A Probably Secure Bi-GISIS Based Modified AKE Scheme With Reusable Keys
  39. A Novel Method for Polar Form of Any Degree of Multivariate Polynomials with Applications in IoT
  40. A novel 3-pass identification scheme and signature scheme based on multivariate quadratic polynomials
  41. Accelerating Number Theoretic Transform in GPU Platform for qTESLA Scheme
  42. Generalization of Hadamard Matrix to Generate Involutory MDS Matrices for Lightweight Cryptography
  43. An Artificial Bee Colony Algorithm for Solving the Weapon Target Assignment Problem
  44. Efficient methods to generate cryptographically significant binary diffusion layers
  45. A Modified Parallel Learning Vector Quantization Algorithm for Real-Time Hardware Applications
  46. Generating binary diffusion layers with maximum/high branch numbers and low search complexity
  47. Sparse polynomial multiplication for lattice-based cryptography with small complexity
  48. New methods for public key cryptosystems based on XTR
  49. Efficient arithmetic for lattice-based cryptography on GPU using the CUDA platform
  50. On the arithmetic operations over finite fields of characteristic three with low complexity
  51. Efficient interleaved Montgomery modular multiplication for lattice-based cryptography
  52. On the Construction of20×20and24
  53. On the generalisation of special moduli for faster interleaved montgomery modular multiplication
  54. A New Representation of Elements of Binary Fields with Subquadratic Space Complexity Multiplication of Polynomials
  55. On the Polynomial Multiplication in Chebyshev Form
  56. Modified Redundant Representation for Designing Arithmetic Circuits with Small Complexity
  57. Polynomial Multiplication over Binary Fields Using Charlier Polynomial Representation with Low Space Complexity