All Stories

  1. A Systematic Survey of Machine Learning and Deep Learning Models Used in Industrial Internet of Things Security
  2. A Systematic Literature Review on Host-Based Intrusion Detection Systems
  3. SoK of Machine Learning and Deep Learning based Anomaly Detection Methods for Automatic Dependent Surveillance-Broadcast
  4. Modified graph-based algorithm to analyze security threats in IoT
  5. A new method for vulnerability and risk assessment of IoT
  6. Kyber, Saber, and SK-MLWR Lattice-Based Key Encapsulation Mechanisms Model Checking with Maude
  7. A new hybrid method combining search and direct based construction ideas to generate all 4 × 4 involutory maximum distance separable (MDS) matrices over binary field extensions
  8. Handbook of Formal Analysis and Verification in Cryptography
  9. Indistinguishability under adaptive chosen-ciphertext attack secure double-NTRU-based key encapsulation mechanism
  10. Attack Path Detection for IIoT Enabled Cyber Physical Systems: Revisited
  11. A survey of quantum secure group signature schemes: Lattice-based approach
  12. Group Key Management in Internet of Things: A Systematic Literature Review
  13. MLWR-2PAKA: A Hybrid Module Learning With Rounding-Based Authenticated Key Agreement Protocol for Two-Party Communication
  14. On the Construction of New Lightweight Involutory MDS Matrices in Generalized Subfield Form
  15. Formal analysis of Post-Quantum Hybrid Key Exchange SSH Transport Layer Protocol
  16. Classification of random number generator applications in IoT: A comprehensive taxonomy
  17. Mobil Cihazların Kuantum Sonrası Güvenliği İçin Uyarlanmış KEM Uygulamaları: Adapted KEM Applications for Post-Quantum Security of Mobile Devices
  18. SSIM Modelin Geliştirilmesine Dayanan Bir 3B Video Kalite Değerlendirme Metriği
  19. Bulut Bilişim Güvenliği İçin Kullanılan Makine Öğrenimi Yöntemleri Üzerine Bir Derleme
  20. A new lattice-based authentication scheme for IoT
  21. Module learning with rounding based key agreement scheme with modified reconciliation
  22. LinRegDroid: Detection of Android Malware Using Multiple Linear Regression Models-Based Classifiers
  23. On the Construction Structures of $$3 \times 3$$ Involutory MDS Matrices over $$\mathbb {F}_{2^{m}}$$
  24. Quantum Secure Communication Between Service Provider and Sim
  25. Permission-based Android malware analysis by using dimension reduction with PCA and LDA
  26. Lattice-based cryptosystems for the security of resource-constrained IoT devices in post-quantum world: a survey
  27. Efficient Implementations of Sieving and Enumeration Algorithms for Lattice-Based Cryptography
  28. Bi-GISIS KE: Modified key exchange protocol with reusable keys for IoT security
  29. Novel Postquantum MQ-Based Signature Scheme for Internet of Things With Parallel Implementation
  30. A novel IoT-based health and tactical analysis model with fog computing
  31. A RESEARCH ON INDOOR POSITIONING SYSTEMS
  32. NESNELERİN İNTERNETİ TABANLI SAĞLIK İZLEME SİSTEMLERİ ÜZERİNE BİR ÇALIŞMA
  33. Parola Tabanlı SIMSec Protokolü
  34. Parallel implementation of Nussbaumer algorithm and number theoretic transform on a GPU platform: application to qTESLA
  35. MaTRU-KE revisited: CCA2-secure key establishment protocol based on MaTRU
  36. On the automorphisms and isomorphisms of MDS matrices and their efficient implementations
  37. A Probably Secure Bi-GISIS Based Modified AKE Scheme With Reusable Keys
  38. A Novel Method for Polar Form of Any Degree of Multivariate Polynomials with Applications in IoT
  39. A novel 3-pass identification scheme and signature scheme based on multivariate quadratic polynomials
  40. Accelerating Number Theoretic Transform in GPU Platform for qTESLA Scheme
  41. Generalization of Hadamard Matrix to Generate Involutory MDS Matrices for Lightweight Cryptography
  42. An Artificial Bee Colony Algorithm for Solving the Weapon Target Assignment Problem
  43. Efficient methods to generate cryptographically significant binary diffusion layers
  44. A Modified Parallel Learning Vector Quantization Algorithm for Real-Time Hardware Applications
  45. Generating binary diffusion layers with maximum/high branch numbers and low search complexity
  46. Sparse polynomial multiplication for lattice-based cryptography with small complexity
  47. New methods for public key cryptosystems based on XTR
  48. Efficient arithmetic for lattice-based cryptography on GPU using the CUDA platform
  49. On the arithmetic operations over finite fields of characteristic three with low complexity
  50. Efficient interleaved Montgomery modular multiplication for lattice-based cryptography
  51. On the Construction of20×20and24
  52. On the generalisation of special moduli for faster interleaved montgomery modular multiplication
  53. A New Representation of Elements of Binary Fields with Subquadratic Space Complexity Multiplication of Polynomials
  54. On the Polynomial Multiplication in Chebyshev Form
  55. Modified Redundant Representation for Designing Arithmetic Circuits with Small Complexity
  56. Polynomial Multiplication over Binary Fields Using Charlier Polynomial Representation with Low Space Complexity