Search
Search Results
-
Proving the (In)Security of CRT Based Key Management Schemes Under SAOA Model
There have been several proposed methods in the literature for securely distributing group keys and managing group dynamics for secure group...
-
A Lightweight PUF based Multi-factor Authentication Technique for Intelligent Smart Healthcare System
The Internet of Things is gaining popularity throughout the world. With the growth of digital communication, healthcare 4.0 are being implemented by...
-
Lessons learned from offline assessment of security-critical systems: the case of microsoft’s active directory
One of the famous directory services on the market is Active Directory (AD) by Microsoft. It consists of a set of services that work on Windows...
-
Confirming Secure Interoperability in Mobile Financial Services: Challenges of Data Federation and Cryptography-Based Solution
Mobile Financial Services (MFS) is a very promising and prospering sector in Bangladesh with emerging challenges. Currently, each MFS providers is... -
Lightweight secure authentication and key agreement technique for smart grid
In the last decade, complex engineering systems have been made automatic, smart, and intelligent by adding computation, communication, and monitoring...
-
Data Sharing and Privacy Preserving Access Policy of Cloud Computing Using Security
People admire the incredible power of cloud computing but cannot fully trust on cloud providers due to the absence of user-to-cloud controllability.... -
Dynamically scalable privacy-preserving authentication protocol for distributed IoT based healthcare service providers
Internet-of-Things (IoT) in digital healthcare service providers forms large-scale distributed networks where entities at the edge enable dynamic...
-
Preliminaries
In this chapter, we first of all present and overview of the theoretical background of public key cryptography (PKC) and its different forms (i.e.,... -
Anonymous and robust biometric authentication scheme for secure social IoT healthcare applications
In the era of rapid technological advancement, the Internet of Things (IoT) has revolutionised healthcare through systems like the Telecare Medicine...
-
Review in Authentication for Mobile Ad Hoc Network
As far back as the 90s, Mobile Ad hoc Networks have successfully gained the scientific community interest because of the ease of their deployment and... -
Efficient Certificateless Signcryption Scheme for Wireless Sensor Networks in Ubiquitous Healthcare Systems
With the current developments in wireless networks, the use of Wireless sensor networks (WSNs) in the medical field has attracted a lot of attention....
-
An Analytical Appraisal on Recent Trends and Challenges in Secret Sharing Schemes
Secret sharing is one of the most widely studied research areas in cryptography and is developed as a method to safeguard cryptographic keys. Modern... -
A comprehensive study on key management, authentication and trust management techniques in wireless sensor networks
Wireless sensor networks (WSN) are the new speed-accelerating technologies worldwide and are used continuously in a range of critical applications....
-
Trust management in online computing environment: a complete review
Nowadays, trust management plays a significant role in different applications like commercial applications, Internet of Things (IoT) based...
-
Cyber-physical security for IoT networks: a comprehensive review on traditional, blockchain and artificial intelligence based key-security
The recent years have garnered huge attention towards the Internet of Things (IoT) because it enables its consumers to improve their lifestyles and...
-
Internet of Things Security and Privacy
This chapter focuses on defining the key IoT security and privacy requirements. A three-domain IoT architecture is considered in the analysis where... -
Dependability
It is said that Nobel Laureate Hannes Alfven once remarked that in Technology Paradise no acts of God can be permitted and everything happens... -
Bilinear Pairing-Based Signcryption Scheme for Secure Heterogeneous Vehicle-to-Infrastructure Communications in VANETs
Nowadays, different communication systems (DSRC, WiFi, WiMAX, 5G/LTE, etc.) provide services in VANETs [8]. Each communication system can be... -
A secure three factor based authentication scheme for health care systems using IoT enabled devices
In recent years, the Internet of Things (IoT) has gained increasing popularity due to the usage of Internet-enabled devices. However,...
-
Introduction
As with most aspects of electronic systems and integrated circuits, hardware security has traditionally evolved around the dominant CMOS technology....