Search
Search Results
-
Heterogeneous Aggregate Signature for Unmanned Aerial Vehicles
In recent years, internet of things (IoT) technology has become an indispensable part of people’s lives. At the same time, the application field of... -
SecP2PVoD: a secure peer-to-peer video-on-demand system against pollution attack and untrusted service provider
The Peer-to-Peer video-on-demand (P2P-VoD) streaming has become widespread in recent years. Unlike the traditional client-server model based...
-
Heterogeneous IoT (HetIoT) security: techniques, challenges and open issues
The HetIoT is a new emergent technology widely used to offer QoS to applications such as health monitoring systems, agriculture 4.0, traffic...
-
Study on Implementation of Shor’s Factorization Algorithm on Quantum Computer
The fundamental security aspect of the classical crypto-system depends on integer factorization and discrete logarithm problems. The quantum...
-
Novel generic construction of leakage-resilient PKE scheme with CCA security
Leakage of private state information (e.g. the secret keys) through various leakage attacks (e.g. side channel attacks, cold-boot attacks, etc) has...
-
A Secure Data Access Control Scheme Without Bilinear Pairing in Edge Computing
Edge computing, as an extension of cloud computing, subcontracts the personal private data to edge nodes on the edge network of Internet of Things... -
Efficient Hash-Based Redactable Signature for Smart Grid Applications
The sharing of energy usage data in smart grids is becoming increasingly popular because it not only allows different entities to access fine-grained... -
Optimization of quality of service using ECEBA protocol in wireless body area network
Smart healthcare using IoT is the Internet of Healthcare Things (IoHT) that consists of smart monitoring of health remotely by forming the wireless...
-
RETRACTED ARTICLE: Hybrid aggregated signcryption scheme using multi-constraints differential evolution algorithm for security
Recently, information security suited for a comprehensive number of practical applications and which mainly affected by an end-to-end security....
-
Comprehensive Data Life Cycle Security in Cloud Computing: Current Mastery and Major Challenges
One of the gravest concerns related to cloud computing pertains to data security. As businesses start on digital transformation, there is a clear... -
An enhanced searchable encryption scheme for secure data outsourcing
In the cloud environment, where the cloud server cannot always be fully trusted, both data and query privacy should be well protected for secure data...
-
Power optimized intelligent Handoff mechanism for 5G-Heterogeneous network
The 5G-heterogeneous system has become worldwide in the current life scenario, advancing in many wireless applications. However, managing Handoff is...
-
CASE: A New Frontier in Public-Key Authenticated Encryption
We introduce a new cryptographic primitive, called Completely Anonymous Signed Encryption (CASE). CASE is a public-key authenticated encryption... -
Certificateless Authentication and Consensus for the Blockchain-Based Smart Grid
Authentication and key agreement scheme facilitates secure two-way communication in the smart grid (SG) and enables each entity to verify whether the... -
In-depth energy analysis of security algorithms and protocols for the Internet of Things
Devices that populate the Internet of Things (IoT) are typically constrained with respect to energy consumption. When the data that are processed,...
-
Decentralized blockchain-based security enhancement with lamport merkle digital signature generation and optimized encryption in cloud environment
Nowadays, data storage in a cloud environment plays an important role in managing large scale information. However, the main problem with using a...
-
An attribute-based lightweight cloud data access control using hypergraph structure
Cloud file storage systems are the current trend of enterprises and also of individual users. Due to the malicious or unauthorized users, file...
-
Leakage-resilient identity-based cryptography from minimal assumptions
Identity-based hash proof system (IB-HPS), a variant of hash proof system (HPS) in the identity-based setting, is a useful building block in...
-
A biometrics-based mutual authentication and key agreement protocol for TMIS using elliptic curve cryptography
Telecare Medicine Information System (TMIS) refers to a medical model that uses communication and information technology to realize multiple medical...