In this work, we present an efficient method for computing in the genera...
Drones are begin used for various purposes such as border security,
surv...
Group authentication is a method of confirmation that a set of users bel...
In parallel with the advances of aerial networks, the use of drones is
q...
In conventional communication systems, any interference between two
comm...
The widespread use of new technologies such as the Internet of things (I...
In this work, we propose a novel key reconciliation protocol for the qua...
In this paper, we consider the problem of secret key generation for mult...
Internet of Things (IoT) networks are becoming a part of our daily lives...
Current advancements in mobility of devices and also Internet of Things ...
Shamir or Blakley secret sharing schemes are used for the authentication...