Research explorer tool

8 results

Next Generation Lightweight Cryptography for Smart IoT Devices: Implementation, Challenges and Applications

Conference Proceeding
Gunathilake, N. A., Buchanan, W. J., & Asif, R. (in press)
Next Generation Lightweight Cryptography for Smart IoT Devices: Implementation, Challenges and Applications. https://doi.org/10.1109/WF-IoT.2019.8767250
High/ultra-high speed data connections are currently being developed, and by the year 2020, it is expected that the 5th generation networking (5GN) should be much smarter. It ...

Future Quantum-to-the-Home (QTTH) All-Optical Networks (Invited Talk)

Conference Proceeding
Asif, R. (2019)
Future Quantum-to-the-Home (QTTH) All-Optical Networks (Invited Talk). In Advanced Infocomm Technologyhttps://doi.org/10.1109/ICAIT.2018.8686543
For imparting data security to the end-users in a archetypal fiber-to-the-home (FTTH) network, quantum cryptography (QC) is getting much attention now-a-days. QC or more speci...

Experimental High Speed Data Encryption via SDM-CV-QKD Signaling for High-Capacity Access Network

Conference Proceeding
Asif, R., Haithem, M., & Buchanan, W. J. (2018)
Experimental High Speed Data Encryption via SDM-CV-QKD Signaling for High-Capacity Access Network. In Advanced Photonics Networkshttps://doi.org/10.1364/networks.2018.neth2f.3
We report a high capacity Quantum-to-the-Home (QTTH) network in a spatialdivision-multiplexing (SDM) network utilizing 7-core multicore fiber (MCF). Aggregate secure key rates...

Securing Cloud Hypervisors: A Survey of the Threats, Vulnerabilities, and Countermeasures

Journal Article
Barrowclough, J. P., & Asif, R. (2018)
Securing Cloud Hypervisors: A Survey of the Threats, Vulnerabilities, and Countermeasures. Security and Communication Networks, 2018, 1-20. https://doi.org/10.1155/2018/1681908
The exponential rise of the cloud computing paradigm has led to the cybersecurity concerns, taking into account the fact that the resources are shared and mediated by a ‘hyper...

Lightweight cryptography methods

Journal Article
Buchanan, W. J., Li, S., & Asif, R. (2018)
Lightweight cryptography methods. Journal of Cyber Security Technology, 1(3-4), 187-201. https://doi.org/10.1080/23742917.2017.1384917
While our conventional cryptography methods, such for AES (encryption), SHA-256 (hashing) and RSA/Elliptic Curve (signing), work well on systems which have reasonable processi...

Quantum Encrypted Signals on Multiuser Optical Fiber Networks: Simulation Analysis of Next Generation Services and Technologies

Conference Proceeding
Asif, R. (2017)
Quantum Encrypted Signals on Multiuser Optical Fiber Networks: Simulation Analysis of Next Generation Services and Technologies. In NoF 2017 Conference Proceedingshttps://doi.org/10.1109/NOF.2017.8251243
Data encryption is gaining much attention these days from the research community and industry for transmitting secure information over access networks, i.e. 'fiber-to-the-home...

Quantum-to-the-Home: Achieving Gbits/s Secure Key Rates via Commercial Off-the-Shelf Telecommunication Equipment

Journal Article
Asif, R., & Buchanan, W. J. (2017)
Quantum-to-the-Home: Achieving Gbits/s Secure Key Rates via Commercial Off-the-Shelf Telecommunication Equipment. Security and Communication Networks, 2017, 1-10. https://doi.org/10.1155/2017/7616847
There is current significant interest in Fiber-to-the-Home (FTTH) networks, i.e. end-to-end optical connectivity. Currently, it may be limited due to the presence of last-mile...

Seamless Cryptographic Key Generation via Off-the-Shelf Telecommunication Components for End-to-End Data Encryption

Conference Proceeding
Asif, R., & Buchanan, W. J. (2017)
Seamless Cryptographic Key Generation via Off-the-Shelf Telecommunication Components for End-to-End Data Encryption. In International Conference on Internet of Things (iThings-2017)https://doi.org/10.1109/iThings-GreenCom-CPSCom-SmartData.2017.140
Quantum key distribution (QKD) systems have already attained much attention for providing end-to-end data encryption to the subscribers. However, it is very important that the...