Authentication, Access Control, and Confidentiality in Networks - Symmetric and Asymmetric Cryptography in Network Security - Network Integrity using One-Way Hash Functions - Proxy, Group, Blind, and Undeniable Digital Signatures for Network Security
Encrypted Key Exchange - Zero-Knowledge Proofs of Identity - Public-Key Cryptography Standards - Data Access Control Framework for IoT Networks - Identity-based Encryption for IoT Networks - Lightweight Authentication for IoT Networks - Lightweight Authentication for COAP Protocol in IoT
DTLS Security for COAP Protocol in IoT - Lightweight Cryptography for COAP Protocol in IoT - Lightweight Cryptography for MQTT Protocol in IoT - Lightweight Authentication for MQTT Protocol in IoT - Network Intrusion Detection Mechanisms
Security Attacks and Defense Mechanisms for RPL Routing Protocol in IoT - Security Attacks and Defense Mechanisms in Mobile Ad Hoc Networks - Secure Routing in Mobile Ad Hoc Networks - Intrusion Detection Mechanisms for Mobile Ad Hoc Networks
Privacy Preserving Routing in Mobile Ad Hoc Networks - Anonymous Routing in Mobile Ad Hoc Networks - Security Attacks and Defense Mechanisms in Wireless Sensor Networks - Replica Attacks in Wireless Sensor Networks
Intrusion Detection System for Wireless Sensor Networks - Secure Routing for Wireless Sensor Networks - Lightweight Cryptography for Wireless Sensor Networks - Lightweight Authentication Techniques in Wireless Sensor Networks
Secure Key Management Approaches in Wireless Sensor Networks - Secure Data Aggregation for Wireless Sensor Networks - Security Issues and Defense Mechanisms for Vehicular Ad Hoc Networks - Key Distribution Techniques for Vehicular Ad Hoc Networks
Location Privacy Techniques in Vehicular Ad Hoc Networks - Intrusion Detection Systems for Vehicular Ad Hoc Networks - Security against Sybil Attacks in Vehicular Ad Hoc Networks