All Stories

  1. Post-quantum PAKE over lattices revised: Smaug-T.PAKE for mobile devices
  2. Lattice-based blockchain platform for IoT: Privacy-enhanced application with lattice-based blind signatures
  3. A novel human-inspired solution to high-dimensional optimization problems
  4. Automatic dependent surveillance-broadcast (ADS-B) anomalous messages and attack type detection: deep learning-based architecture
  5. Security-aware RPL: Designing a novel objective function for risk-based routing with rank evaluation
  6. DeepSpoofNet: a framework for securing UAVs against GPS spoofing attacks
  7. Expectation maximization—vector approximate message passing based generalized linear model for channel estimation in intelligent reflecting surface-assisted millimeter multi-user multiple-input multiple-output systems
  8. A Hybrid Graph-Based Risk Assessment and Attack Path Detection Model for IoT Systems
  9. Development of Various Stacking Ensemble-Based HIDS Using ADFA Datasets
  10. PP-PQB: Privacy-Preserving in Post-Quantum Blockchain-Based Systems: A Systematization of Knowledge
  11. Anomaly detection system for ADS-B data: Attack vectors and machine learning models
  12. Metaheuristic optimized complex-valued dilated recurrent neural network for attack detection in internet of vehicular communications
  13. 2-bit Multiplication Quantum Circuit with Addition
  14. A Comprehensive Comparison of Lattice-Based Password Authenticated Key Exchange Protocols Defined on Modules
  15. Anomaly Detection with Machine Learning Models Using API Calls
  16. Comparison of Machine Learning Based Anomaly Detection Methods for ADS-B System
  17. Application of BukaGini algorithm for enhanced feature interaction analysis in intrusion detection systems
  18. A Systematic Survey of Machine Learning and Deep Learning Models Used in Industrial Internet of Things Security
  19. A Systematic Literature Review on Host-Based Intrusion Detection Systems
  20. SoK of Machine Learning and Deep Learning based Anomaly Detection Methods for Automatic Dependent Surveillance-Broadcast
  21. Quantum Resistance Saber-Based Group Key Exchange Protocol for IoTs
  22. Modified graph-based algorithm to analyze security threats in IoT
  23. A new method for vulnerability and risk assessment of IoT
  24. Kyber, Saber, and SK-MLWR Lattice-Based Key Encapsulation Mechanisms Model Checking with Maude
  25. A new hybrid method combining search and direct based construction ideas to generate all 4 × 4 involutory maximum distance separable (MDS) matrices over binary field extensions
  26. Handbook of Formal Analysis and Verification in Cryptography
  27. Indistinguishability under adaptive chosen-ciphertext attack secure double-NTRU-based key encapsulation mechanism
  28. Attack Path Detection for IIoT Enabled Cyber Physical Systems: Revisited
  29. A survey of quantum secure group signature schemes: Lattice-based approach
  30. Group Key Management in Internet of Things: A Systematic Literature Review
  31. MLWR-2PAKA: A Hybrid Module Learning With Rounding-Based Authenticated Key Agreement Protocol for Two-Party Communication
  32. On the Construction of New Lightweight Involutory MDS Matrices in Generalized Subfield Form
  33. Formal analysis of Post-Quantum Hybrid Key Exchange SSH Transport Layer Protocol
  34. Classification of random number generator applications in IoT: A comprehensive taxonomy
  35. Mobil Cihazların Kuantum Sonrası Güvenliği İçin Uyarlanmış KEM Uygulamaları: Adapted KEM Applications for Post-Quantum Security of Mobile Devices
  36. SSIM Modelin Geliştirilmesine Dayanan Bir 3B Video Kalite Değerlendirme Metriği
  37. Bulut Bilişim Güvenliği İçin Kullanılan Makine Öğrenimi Yöntemleri Üzerine Bir Derleme
  38. A new lattice-based authentication scheme for IoT
  39. Module learning with rounding based key agreement scheme with modified reconciliation
  40. LinRegDroid: Detection of Android Malware Using Multiple Linear Regression Models-Based Classifiers
  41. On the Construction Structures of $$3 \times 3$$ Involutory MDS Matrices over $$\mathbb {F}_{2^{m}}$$
  42. Quantum Secure Communication Between Service Provider and Sim
  43. Permission-based Android malware analysis by using dimension reduction with PCA and LDA
  44. Lattice-based cryptosystems for the security of resource-constrained IoT devices in post-quantum world: a survey
  45. Efficient Implementations of Sieving and Enumeration Algorithms for Lattice-Based Cryptography
  46. Bi-GISIS KE: Modified key exchange protocol with reusable keys for IoT security
  47. Novel Postquantum MQ-Based Signature Scheme for Internet of Things With Parallel Implementation
  48. A novel IoT-based health and tactical analysis model with fog computing
  49. A RESEARCH ON INDOOR POSITIONING SYSTEMS
  50. NESNELERİN İNTERNETİ TABANLI SAĞLIK İZLEME SİSTEMLERİ ÜZERİNE BİR ÇALIŞMA
  51. Parola Tabanlı SIMSec Protokolü
  52. Parallel implementation of Nussbaumer algorithm and number theoretic transform on a GPU platform: application to qTESLA
  53. MaTRU-KE revisited: CCA2-secure key establishment protocol based on MaTRU
  54. On the automorphisms and isomorphisms of MDS matrices and their efficient implementations
  55. A Probably Secure Bi-GISIS Based Modified AKE Scheme With Reusable Keys
  56. A Novel Method for Polar Form of Any Degree of Multivariate Polynomials with Applications in IoT
  57. A novel 3-pass identification scheme and signature scheme based on multivariate quadratic polynomials
  58. Accelerating Number Theoretic Transform in GPU Platform for qTESLA Scheme
  59. Generalization of Hadamard Matrix to Generate Involutory MDS Matrices for Lightweight Cryptography
  60. An Artificial Bee Colony Algorithm for Solving the Weapon Target Assignment Problem
  61. Efficient methods to generate cryptographically significant binary diffusion layers
  62. A Modified Parallel Learning Vector Quantization Algorithm for Real-Time Hardware Applications
  63. Generating binary diffusion layers with maximum/high branch numbers and low search complexity
  64. Sparse polynomial multiplication for lattice-based cryptography with small complexity
  65. New methods for public key cryptosystems based on XTR
  66. Efficient arithmetic for lattice-based cryptography on GPU using the CUDA platform
  67. On the arithmetic operations over finite fields of characteristic three with low complexity
  68. Efficient interleaved Montgomery modular multiplication for lattice-based cryptography
  69. On the Construction of20×20and24
  70. On the generalisation of special moduli for faster interleaved montgomery modular multiplication
  71. A New Representation of Elements of Binary Fields with Subquadratic Space Complexity Multiplication of Polynomials
  72. On the Polynomial Multiplication in Chebyshev Form
  73. Modified Redundant Representation for Designing Arithmetic Circuits with Small Complexity
  74. Polynomial Multiplication over Binary Fields Using Charlier Polynomial Representation with Low Space Complexity