All Stories

  1. Efficient and secure privacy-preserving authentication protocol for vehicle-to-grid system using ECC
  2. Lattice-based cryptography and applications for networking
  3. Comments on mutual authentication schemes for security of digital twins technology
  4. Role of quantum cryptography to maintain secure communication
  5. Optimization Techniques for Decision-making and Information Security
  6. A secure user authentication protocol using elliptic curve cryptography