We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 81-100 of 638 results
  1. Heterogeneous Aggregate Signature for Unmanned Aerial Vehicles

    In recent years, internet of things (IoT) technology has become an indispensable part of people’s lives. At the same time, the application field of...
    **angyu Pan, Fagen Li in Frontiers in Cyber Security
    Conference paper 2024
  2. SecP2PVoD: a secure peer-to-peer video-on-demand system against pollution attack and untrusted service provider

    The Peer-to-Peer video-on-demand (P2P-VoD) streaming has become widespread in recent years. Unlike the traditional client-server model based...

    Mahender Kumar, Satish Chand in Multimedia Tools and Applications
    Article 13 December 2019
  3. Heterogeneous IoT (HetIoT) security: techniques, challenges and open issues

    The HetIoT is a new emergent technology widely used to offer QoS to applications such as health monitoring systems, agriculture 4.0, traffic...

    Shalaka S. Mahadik, Pranav M. Pawar, Raja Muthalagu in Multimedia Tools and Applications
    Article 29 September 2023
  4. Study on Implementation of Shor’s Factorization Algorithm on Quantum Computer

    The fundamental security aspect of the classical crypto-system depends on integer factorization and discrete logarithm problems. The quantum...

    Mandeep Kumar, Bhaskar Mondal in SN Computer Science
    Article 08 April 2024
  5. Novel generic construction of leakage-resilient PKE scheme with CCA security

    Leakage of private state information (e.g. the secret keys) through various leakage attacks (e.g. side channel attacks, cold-boot attacks, etc) has...

    Yanwei Zhou, Bo Yang, ... Yi Mu in Designs, Codes and Cryptography
    Article 19 May 2021
  6. A Secure Data Access Control Scheme Without Bilinear Pairing in Edge Computing

    Edge computing, as an extension of cloud computing, subcontracts the personal private data to edge nodes on the edge network of Internet of Things...
    Conference paper 2020
  7. Efficient Hash-Based Redactable Signature for Smart Grid Applications

    The sharing of energy usage data in smart grids is becoming increasingly popular because it not only allows different entities to access fine-grained...
    Fei Zhu, Xun Yi, ... **nyi Huang in Computer Security – ESORICS 2022
    Conference paper 2022
  8. Optimization of quality of service using ECEBA protocol in wireless body area network

    Smart healthcare using IoT is the Internet of Healthcare Things (IoHT) that consists of smart monitoring of health remotely by forming the wireless...

    Renuka Sahebrao Pawar, Dhananjay Ramrao Kalbande in International Journal of Information Technology
    Article 11 January 2023
  9. RETRACTED ARTICLE: Hybrid aggregated signcryption scheme using multi-constraints differential evolution algorithm for security

    Recently, information security suited for a comprehensive number of practical applications and which mainly affected by an end-to-end security....

    A. Sivasundari, M. Ramakrishnan in Cluster Computing
    Article 19 February 2018
  10. Comprehensive Data Life Cycle Security in Cloud Computing: Current Mastery and Major Challenges

    One of the gravest concerns related to cloud computing pertains to data security. As businesses start on digital transformation, there is a clear...
    Kenza Chaoui, Nadia Kabachi, ... Hassan Badir in New Technologies, Artificial Intelligence and Smart Data
    Conference paper 2024
  11. An enhanced searchable encryption scheme for secure data outsourcing

    In the cloud environment, where the cloud server cannot always be fully trusted, both data and query privacy should be well protected for secure data...

    Rui Zhang, Jiabei Wang, ... ** Wang in Science China Information Sciences
    Article 10 February 2020
  12. Power optimized intelligent Handoff mechanism for 5G-Heterogeneous network

    The 5G-heterogeneous system has become worldwide in the current life scenario, advancing in many wireless applications. However, managing Handoff is...

    Kiran Mannem, Pasumarthy Nageswara Rao, S. Chandra Mohan Reddy in Multimedia Tools and Applications
    Article 13 December 2023
  13. CASE: A New Frontier in Public-Key Authenticated Encryption

    We introduce a new cryptographic primitive, called Completely Anonymous Signed Encryption (CASE). CASE is a public-key authenticated encryption...
    Shashank Agrawal, Shweta Agrawal, ... Jayesh Singla in Theory of Cryptography
    Conference paper 2023
  14. Certificateless Authentication and Consensus for the Blockchain-Based Smart Grid

    Authentication and key agreement scheme facilitates secure two-way communication in the smart grid (SG) and enables each entity to verify whether the...
    Egide Nkurunziza, Gervais Mwitende, ... Fagen Li in Frontiers in Cyber Security
    Conference paper 2022
  15. In-depth energy analysis of security algorithms and protocols for the Internet of Things

    Devices that populate the Internet of Things (IoT) are typically constrained with respect to energy consumption. When the data that are processed,...

    Jori Winderickx, An Braeken, ... Nele Mentens in Journal of Cryptographic Engineering
    Article 24 November 2021
  16. Decentralized blockchain-based security enhancement with lamport merkle digital signature generation and optimized encryption in cloud environment

    Nowadays, data storage in a cloud environment plays an important role in managing large scale information. However, the main problem with using a...

    Sachi Pandey, Ritin Behl, Amit Sinha in Multimedia Tools and Applications
    Article 26 October 2023
  17. An attribute-based lightweight cloud data access control using hypergraph structure

    Cloud file storage systems are the current trend of enterprises and also of individual users. Due to the malicious or unauthorized users, file...

    R. Mythili, Revathi Venkataraman, T. Sai Raj in The Journal of Supercomputing
    Article 02 January 2020
  18. Leakage-resilient identity-based cryptography from minimal assumptions

    Identity-based hash proof system (IB-HPS), a variant of hash proof system (HPS) in the identity-based setting, is a useful building block in...

    Yanwei Zhou, Bo Yang, ... Yi Mu in Designs, Codes and Cryptography
    Article 16 August 2023
  19. A biometrics-based mutual authentication and key agreement protocol for TMIS using elliptic curve cryptography

    Telecare Medicine Information System (TMIS) refers to a medical model that uses communication and information technology to realize multiple medical...

    Yulei Chen, Jianhua Chen in Multimedia Tools and Applications
    Article 12 October 2022
Did you find what you were looking for? Share feedback.