![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
-
Article
Authenticated key agreement for IoT network using HECC and CRT four co-primes
Internet of Things (IoT) is an integral part of our daily lives and the security of these devices is paramount. However, IoT devices are often resource constrained, requiring implementations of efficient light...
-
Article
Emission of Polycyclic Aromatic Hydrocarbons from Co-combustion of Coal and Corncob
The emission of polycyclic aromatic hydrocarbons (PAHs) due to coal co-combustion with corncob (0, 10, 20, and 30%) was studied through a pilot scale drop tube furnace. Total PAHs (∑PAH) emission (gas + partic...
-
Article
Strongly-resilient, well connected, non-interactive and gateway-free hierarchical deterministic key agreement schemes using Chinese remainder theorem
Efficient key agreement schemes (KAS) that manage symmetric key cryptographic (SKC) secrets (or keys) are essential for lightweight security solutions. There exists numerous cost-effective distributed KAS, eit...
-
Article
Investigation on the combustion characteristics of different plant parts of Cassia siamea by DSC-TGA
Plant parts like root, wood, twig and leaf of Cassia siamea, a fast-growing tree in the abandoned mines of Jharkhand, India, have been considered here as a possible fuel source for decentralized power generation....
-
Article
Thermal Behavior of Some Indian Coals: Inferences from Simultaneous Thermogravimetry–Calorimetry and Rock–Eval
In this work, thermal behaviors of ten coal samples (across different thermal maturity levels) collected from five different open cast mines in the Jharia and Raniganj basins, India, were examined using differ...
-
Article
Coal combustion analysis using Rock-Eval: importance of S4-Tpeak
The Rock-Eval technique has been conventionally used for source-rock analysis. In this work we document the importance of Rock-Eval S4 oxidation graphics and S4-Tpeak as indicators for coal reactivity and thermal...
-
Chapter and Conference Paper
CRT-KPS: A Key Predistribution Schemes Using CRT
Key Predistribution Schemes (KPS) are efficient key management solutions that are well suited to establish lightweight symmetric keys even in resource starved environments, like low cost Internet of Things (Io...
-
Chapter and Conference Paper
Publicly Verifiable Secret Sharing Scheme in Hierarchical Settings Using CLSC over IBC
This paper presents a simple construction of an efficient publicly verifiable secret sharing scheme (PVSS) in hierarchical settings that uses bilinear pairing (BLP) maps. Till date, hierarchical secret sharing...
-
Chapter and Conference Paper
Frequency Switch, Secret Sharing and Recursive Use of Hash Functions Secure (Low Cost) Ad Hoc Networks
Low cost ad hoc networks like Wireless Sensor Networks (WSNs) are best suited to gather sensory information. Sensitivity of these classified information leads to the necessity of implementing security protocol...
-
Chapter and Conference Paper
Secure IoT Using Weighted Signed Graphs
Key management has always remained a challenging problem for the entire security community. Standard practice in modern times is to agree on symmetric keys using public key protocols. However, public key prot...
-
Chapter and Conference Paper
Key Predistribution Schemes Using Bent Functions in Distributed Sensor Networks
Key management is an essential functionality for develo** secure cryptosystems; particularly for implementations to low cost devices of a Distributed Sensor Networks (DSN)–a prototype of Internet of Things (...
-
Chapter and Conference Paper
Enhancing Resilience of KPS Using Bidirectional Hash Chains and Application on Sensornet
Key predistribution schemes (KPS) that establish symmetric secrets are best suited for resource constraint devices of low cost Internet of Things (IoT). Due to the large size of network and the limited memory,...
-
Chapter and Conference Paper
Lightweight Deterministic Non Interactive (ni) Hierarchical Key Agreement Scheme (KAS)
Key management is a cornerstone requirement for any security solution. Energy efficient key agreement schemes (KAS) that establish symmetric secrets are best suited for resource constraint devices of low cost ...
-
Chapter and Conference Paper
Inductive Hierarchical Identity Based Key Agreement with Pre-deployment Interactions (i-H-IB-KA-pdi)
We propose two hierarchical identity based key agreement schemes with unrestricted number of levels. Our solutions use pre-deployment (encrypted) interactions among ancestors using–(i) purely public key crypto...
-
Chapter and Conference Paper
Securing Sensor Networks by Moderating Frequencies
Security of Wireless Sensor Network (WSN) is a key issue in information security. Most existing security protocols exploit various Mathematical tools to strengthen their security. Some protocols use the detail...
-
Chapter and Conference Paper
Code Based KPD Scheme with Full Connectivity: Deterministic Merging
Key PreDistribution (KPD) is one of the standard key management techniques of distributing the symmetric cryptographic keys among the resource constrained nodes of a Wireless Sensor Network (WSN). To optimize ...
-
Chapter and Conference Paper
100% Connectivity for Location Aware Code Based KPD in Clustered WSN: Merging Blocks
Key management in wireless sensor networks (WSN) is a challenging task because of the stringent resource available to the nodes. As such key predistribution (KPD) is regarded as one of the best option for key ...
-
Chapter and Conference Paper
Highly Resilient Key Predistribution Scheme Using Transversal Designs and Reed Muller Codes For Wireless Sensor Network
Resource constraints of the nodes make security protocols difficult to implement. Thus key management is an important area of research in Wireless Sensor Networks (WSN). Key predistribution (kpd) which involve...
-
Chapter and Conference Paper
Highly Resilient Communication Using Affine Planes for Key Predistribution and Reed Muller Codes for Connectivity in Wireless Sensor Network
Wireless Sensor Networks (WSN) consist of low powered and resource constrained sensor nodes which are left unattended for long duration of time. Hence it is very challenging to design and implement cost effect...
-
Chapter and Conference Paper
Key Predistribution Scheme Using Finite Fields and Reed Muller Codes
Resource constraint sensors of a Wireless Sensor Network (WSN) cannot afford the use of costly encryption techniques like public key while dealing with sensitive data. So symmetric key encryption techniques are p...