We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 1-20 of 655 results
  1. A lightweight identity based generalized signcryption scheme for secure communication in standard model

    The implementation of secure communication in the Industrial Internet of Things (IIoT) has made and it is a significant security concern....

    Tej Singh, Mukesh Kumar, ... Worku Jifara Sori in International Journal of Information Technology
    Article 22 December 2023
  2. Efficient access control scheme for heterogeneous signcryption based on blockchain in VANETs

    Access control refers to the mechanisms and policies determining which vehicles or entities can access certain network resources, services, or...

    Wael Khalafalla, Wen-**ng Zhu, ... Issameldeen Elfadul in Cluster Computing
    Article 30 April 2024
  3. An efficient certificateless group signcryption scheme using Quantum Chebyshev Chaotic Maps in HC-IoT environments

    Signcryption is a highly efficient approach to simultaneously achieving message confidentiality and authentication in Human-Centered IoT (HC-IoT)...

    Chandrashekhar Meshram, Rabha W. Ibrahim, ... Sarita Gajbhiye Meshram in The Journal of Supercomputing
    Article 04 May 2023
  4. POOSC: Provably online/offline signcryption scheme for vehicular communication in VANETs

    The rapid advancements in computer systems and wireless sensor networks (WSNs) motivate many intelligent transportation systems (ITSs) applications...

    Ahmed Elkhalil, Jiashu zhang, ... Nabeil Eltayieb in Computing
    Article 08 July 2023
  5. Quantum-secure plaintext checkable signcryption

    A public plaintext query on a ciphertext using plaintext checkable encryption is a cryptographic primitive studied extensively to promote the search...

    Article 26 September 2022
  6. Symmetric Signcryption and E2EE Group Messaging in Keybase

    We introduce a new cryptographic primitive called symmetric signcryption, which differs from traditional signcryption because the sender and...
    Joseph Jaeger, Akshaya Kumar, Igors Stepanovs in Advances in Cryptology – EUROCRYPT 2024
    Conference paper 2024
  7. Identity-based signcryption scheme for medical cyber physical system in standard model

    The medical cyber-physical system (MCPS) has recently received massive consideration with the growth of healthcare 4.0. However, maintaining...

    Rachana Yogesh Patil, Yogesh H. Patil in International Journal of Information Technology
    Article 04 June 2022
  8. An investigating study of blind and ID-based signcryption schemes for misuse risk protection and high performance computing

    The risks of misusing new and develo** technology are increasing on a daily basis. In these technologies, electronic communication...

    Shamsher Ullah, Zheng Jiangbin, ... Salabat Khan in Cluster Computing
    Article 11 February 2023
  9. QuSigS: A quantum Signcryption scheme to recover key escrow problem and key revocation problem in cloud computing

    In recent years, cloud computing plays a vital role in IT industries. Cloud computing is the sum of software as a service (SaaS) and utility...

    Shamsher Ullah, Muhammad Tanveer Hussain, Mahwish Yousaf in Multimedia Tools and Applications
    Article 13 August 2022
  10. A secure privacy preserving and access control scheme for medical internet of things (MIoT) using attribute-based signcryption

    The proliferation of medical internet of things (MIoT)-enabled medical devices and systems has completely transformed the healthcare industry....

    Article 23 October 2023
  11. Hash Edward Curve Signcryption for Secure Big Data Transmission

    Medical health service data is kept in huge dataset and shared through different devices. However, privacy and security of data sharing area...
    S. Sangeetha, P. Suresh Babu in Computational Sciences and Sustainable Technologies
    Conference paper 2024
  12. Practical heterogeneous signcryption system for vehicular communication in VANETs

    Vehicular ad hoc networks (VANETs) refer to ad hoc networks where many vehicles and other devices connect to wireless communications and exchange...

    Ahmed Elkhalil, Jiashu zhang in Computing
    Article 08 September 2022
  13. Heterogeneous Signcryption Scheme with Equality Test for Internet of Vehicles

    By collecting and using vehicle dynamic data from sensors on vehicles, Internet of Vehicles (IoV) has greatly enhanced the convenience and...
    Chunhua **, Wenyu Qin, ... **song Shan in Frontiers in Cyber Security
    Conference paper 2024
  14. Post-quantum blind signcryption scheme from lattice

    Blind signcryption (BSC) can guarantee the blindness and untrackability of signcrypted messages, and moreover, it provides simultaneous...

    Article 29 June 2021
  15. Certificateless Ring Signcryption Scheme with Conditional Privacy Protection in Smart Grid

    In the context of smart grids, bidirectional transmission of electricity information enables real-time electricity generation tailored to consumer...
    Shuanggen Liu, Zhentao Liu, ... Zirong Heng in Frontiers in Cyber Security
    Conference paper 2024
  16. A Signcryption Approach to Address Security and Privacy Issues in Online Gaming Platforms

    Online game has become increasingly popular with people of all ages. But it also poses a number of security and privacy risks and children are...
    Conference paper 2024
  17. An Efficient Generic Insider Secure Signcryption with Non-Interactive Non-Repudiation

    We present a generic construction of an insider secure signcryption scheme with non-interactive non-repudiation. Our construction uses as building...
    Ngarenon Togde, Augustin P. Sarr in Security, Privacy, and Applied Cryptography Engineering
    Conference paper 2024
  18. Signcryption-Based Encrypted Traffic Detection Scheme for Fast Establishing Secure Connections

    The popularity of Internet traffic encryption has made encrypted traffic detection becoming a hot topic in the present academic community. Due to its...
    Hao Zhu, Fagen Li, ... Jianfeng Ma in Provable and Practical Security
    Conference paper 2023
  19. Verifiable and Boolean keyword searchable attribute-based signcryption for electronic medical record storage and retrieval in cloud computing environment

    Cloud-based electronic medical record (EMR) management system is an emerging paradigm that enables EMR owners to store and share their EMRs with...

    Sourav Bera, Suryakant Prasad, Y. Sreenivasa Rao in The Journal of Supercomputing
    Article 13 June 2023
  20. A Secure and Efficient Heterogeneous Signcryption Scheme for IIoT

    With the development of the Internet of Things (IoT), the Industrial Internet of Things (IIoT), as an extension of the IoT, has become more and more...
    Chunhua **, Chenhao Li, ... Guanhua Chen in Frontiers in Cyber Security
    Conference paper 2022
Did you find what you were looking for? Share feedback.