We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 1-20 of 71 results
  1. Proving the (In)Security of CRT Based Key Management Schemes Under SAOA Model

    There have been several proposed methods in the literature for securely distributing group keys and managing group dynamics for secure group...

    Payal Sharma, B. R. Purushothama in Wireless Personal Communications
    Article 01 February 2024
  2. A Lightweight PUF based Multi-factor Authentication Technique for Intelligent Smart Healthcare System

    The Internet of Things is gaining popularity throughout the world. With the growth of digital communication, healthcare 4.0 are being implemented by...

    Ravi Raushan Kumar Chaudhary, Kakali Chatterjee in Peer-to-Peer Networking and Applications
    Article 27 June 2023
  3. Lessons learned from offline assessment of security-critical systems: the case of microsoft’s active directory

    One of the famous directory services on the market is Active Directory (AD) by Microsoft. It consists of a set of services that work on Windows...

    Article 12 August 2021
  4. Confirming Secure Interoperability in Mobile Financial Services: Challenges of Data Federation and Cryptography-Based Solution

    Mobile Financial Services (MFS) is a very promising and prospering sector in Bangladesh with emerging challenges. Currently, each MFS providers is...
    Razib Hayat Khan, Rakib Ul Haque, ... Mohammad Faisal Uddin in Intelligent Sustainable Systems
    Conference paper 2024
  5. Lightweight secure authentication and key agreement technique for smart grid

    In the last decade, complex engineering systems have been made automatic, smart, and intelligent by adding computation, communication, and monitoring...

    Disuja Kumari, Karan Singh in Peer-to-Peer Networking and Applications
    Article 22 December 2023
  6. Data Sharing and Privacy Preserving Access Policy of Cloud Computing Using Security

    People admire the incredible power of cloud computing but cannot fully trust on cloud providers due to the absence of user-to-cloud controllability....
    Dhanashri Kamble, Rajni Patel, Prajakta Deshmukh in Techno-societal 2022
    Conference paper 2024
  7. Dynamically scalable privacy-preserving authentication protocol for distributed IoT based healthcare service providers

    Internet-of-Things (IoT) in digital healthcare service providers forms large-scale distributed networks where entities at the edge enable dynamic...

    Hiral S. Trivedi, Sankita J. Patel in Wireless Networks
    Article 08 December 2022
  8. Preliminaries

    In this chapter, we first of all present and overview of the theoretical background of public key cryptography (PKC) and its different forms (i.e.,...
    Chapter 2022
  9. Anonymous and robust biometric authentication scheme for secure social IoT healthcare applications

    In the era of rapid technological advancement, the Internet of Things (IoT) has revolutionised healthcare through systems like the Telecare Medicine...

    T. Arpitha, Dharamendra Chouhan, J. Shreyas in Journal of Engineering and Applied Science
    Article Open access 03 January 2024
  10. Review in Authentication for Mobile Ad Hoc Network

    As far back as the 90s, Mobile Ad hoc Networks have successfully gained the scientific community interest because of the ease of their deployment and...
    Hafida Khalfaoui, Abderrazak Farchane, Said Safi in Advances on Smart and Soft Computing
    Conference paper 2022
  11. Efficient Certificateless Signcryption Scheme for Wireless Sensor Networks in Ubiquitous Healthcare Systems

    With the current developments in wireless networks, the use of Wireless sensor networks (WSNs) in the medical field has attracted a lot of attention....

    Philemon Nthenge Kasyoka, Michael Kimwele, Shem Angolo Mbandu in Wireless Personal Communications
    Article 19 February 2021
  12. An Analytical Appraisal on Recent Trends and Challenges in Secret Sharing Schemes

    Secret sharing is one of the most widely studied research areas in cryptography and is developed as a method to safeguard cryptographic keys. Modern...
    Conference paper 2023
  13. A comprehensive study on key management, authentication and trust management techniques in wireless sensor networks

    Wireless sensor networks (WSN) are the new speed-accelerating technologies worldwide and are used continuously in a range of critical applications....

    Amit Kumar Gautam, Rakesh Kumar in SN Applied Sciences
    Article Open access 09 January 2021
  14. Trust management in online computing environment: a complete review

    Nowadays, trust management plays a significant role in different applications like commercial applications, Internet of Things (IoT) based...

    Ashish Singh, Kakali Chatterjee in Journal of Ambient Intelligence and Humanized Computing
    Article 14 September 2023
  15. Cyber-physical security for IoT networks: a comprehensive review on traditional, blockchain and artificial intelligence based key-security

    The recent years have garnered huge attention towards the Internet of Things (IoT) because it enables its consumers to improve their lifestyles and...

    Ankit Attkan, Virender Ranga in Complex & Intelligent Systems
    Article Open access 24 February 2022
  16. Internet of Things Security and Privacy

    This chapter focuses on defining the key IoT security and privacy requirements. A three-domain IoT architecture is considered in the analysis where...
    Ammar Rayes, Samer Salam in Internet of Things from Hype to Reality
    Chapter 2022
  17. Dependability

    It is said that Nobel Laureate Hannes Alfven once remarked that in Technology Paradise no acts of God can be permitted and everything happens...
    Hermann Kopetz, Wilfried Steiner in Real-Time Systems
    Chapter 2022
  18. Bilinear Pairing-Based Signcryption Scheme for Secure Heterogeneous Vehicle-to-Infrastructure Communications in VANETs

    Nowadays, different communication systems (DSRC, WiFi, WiMAX, 5G/LTE, etc.) provide services in VANETs [8]. Each communication system can be...
    Chapter 2022
  19. A secure three factor based authentication scheme for health care systems using IoT enabled devices

    In recent years, the Internet of Things (IoT) has gained increasing popularity due to the usage of Internet-enabled devices. However,...

    Shreeya Swagatika Sahoo, Sujata Mohanty, Banshidhar Majhi in Journal of Ambient Intelligence and Humanized Computing
    Article 09 July 2020
  20. Introduction

    As with most aspects of electronic systems and integrated circuits, hardware security has traditionally evolved around the dominant CMOS technology....
    Nikhil Rangarajan, Satwik Patnaik, ... Ozgur Sinanoglu in The Next Era in Hardware Security
    Chapter 2021
Did you find what you were looking for? Share feedback.