Recommendation for key management:

@inproceedings{Barker2005RecommendationFK,
  title={Recommendation for key management:},
  author={Elaine B. Barker and Winona C. Barker and Wolfgang Burr and William T. Polk and Michiel H. M. Smid},
  year={2005}
}
Cryptanalysis of an elliptic curve cryptosystem for wireless sensor networks
TLDR
A brute-force attack on an elliptic curve cryptosystem implemented on UC Berkley's TinyOS operating system for Wireless Sensor Networks (WSNs) using the short period of the Pseudorandom Number Generator (PRNG) to generate private keys is presented.
Authentication Protocols in Internet of Vehicles: Taxonomy, Analysis, and Challenges
TLDR
Various security aspects, threats and attacks, network and threat models related to the IoV environment are discussed, and a taxonomy of security protocols is given that is essential to provide IoV data security.
TCALAS: Temporal Credential-Based Anonymous Lightweight Authentication Scheme for Internet of Drones Environment
TLDR
A novel temporal credential based anonymous lightweight user authentication mechanism for IoD environment, called TCALAS, which has the capability to resist various known attacks against passive/active adversary and lower costs in both computation and communication as compared to existing schemes.
Efficient Fixed-base exponentiation and scalar multiplication based on a multiplicative splitting exponent recoding
TLDR
This paper presents a new approach for storage/online computation trade-off, by using a multiplicative splitting of the digits of the exponent radix-R representation, and adapt classical algorithms for modular exponentiation and scalar multiplication in order to take advantage of the proposed exponent recoding.
Efficient anonymous biometric matching in privacy-aware environments
TLDR
A novel privacy information management system that allows subjects to access their information via the same biometric signals used for ABAC, and introduces the k-Anonymous Quantization (kAQ) framework to provide an effective and secure tradeoff of privacy and complexity.
Collaborative and Secure Estimation of IP Address Space Utilisation
TLDR
This work presents a collaborative and secure capture-recapture technique for estimating the IP address space utilisation of the whole Internet, and demonstrates that the scheme scales well to datasets of 1–2 billion addresses across 5–10 collaborators, with estimation errors below 5%.
Security and Privacy in Biometrics
TLDR
This important text/reference presents the latest secure and privacy-compliant techniques in automatic human recognition, with a unique focus on novel approaches and new architectures for unimodal and multimodal template protection.
Encryption and Key Exchange in Wireless Sensor Networks
TLDR
An overview of selected encryption schemes is provided and so called fault attacks targeting hardware implementations of block ciphers are introduced, with a focus on Identity Based Encryption (IBE), which is especially useful in scenarios with a trusted sink node.
Scalable Private Set Intersection Cardinality for Capture-Recapture with Multiple Private Datasets
TLDR
This work proposes an improved technique based on commutative encryption and deterministic hash-based sampling that is secure and scalable, and also prevents so-called probing attacks.
A Privacy-Preserved E2E Authenticated Key Exchange Protocol for Multi-Server Architecture in Edge Computing Networks
TLDR
A privacy-preserved end-to-end password-based authenticated key exchange protocol for multi-server architecture in edge computing networks that provides strong user anonymity during communication process and is proved to be secure using BAN logic and AVISPA tool.
...
...