Abstract: The recent advancement in quantum computers generates the threat alarm of breaking the security of key exchange protocols, which is based on discrete logarithmic or prime factorization ...
Abstract: As the proliferation of 5th generation mobile communication technology (5G) accelerates the adoption of Internet of Things (IoT) applications, building robust and secure communication ...