A Security-Enhanced Certificateless Aggregate Authentication Protocol with Revocation for Wireless Medical Sensor Networks. [PDF]
Fan Q, Wang Y, Li X.
europepmc +1 more source
A Kyber-Based Lightweight Cloud-Assisted Authentication Scheme for Medical IoT. [PDF]
Yan H, Wang Z, Lin L, Sun J, Liu S.
europepmc +1 more source
Privacy-Preserving ECC-Based AKA for Resource-Constrained IoT Sensor Networks with Forgotten Password Reset. [PDF]
Yu Y, Wei K, Qi K, Wu W.
europepmc +1 more source
A hybrid blockchain migration framework for converting traditional databases into blockchain-based EMR systems. [PDF]
Al-Busaidi A, Mani J, Yoosuf MS, P V.
europepmc +1 more source
Post-Quantum Revocable Linkable Ring Signature Scheme Based on SPHINCS+ for V2G Scenarios. [PDF]
Liu S, Du YN, Wang XA, Hu X, Su HE.
europepmc +1 more source
A Lightweight IDS Based on Blockchain and Machine Learning for Detecting Physical Attacks in Wireless Sensor Networks. [PDF]
Jabor MS +3 more
europepmc +1 more source
Comparative Analysis of Different Cryptographic Hash Functions
Cryptographic hash functions are crucial tools used to protect information in digital devices. These functions take an input of various size consisting of characters and convert it to a digest of fixed size, known as a hash value. The functions produce the same hash value when using the same input, and are not invertible.
Kaufmann, Alex, Gartmon, Emelie
openaire +1 more source
A secure multi phase authentication protocol for cloud infrastructure using elliptic curve cryptography. [PDF]
Sivasankar R, Marikkannan M.
europepmc +1 more source
A scalable post quantum secure blockchain framework with adaptive time consensus in cloud environments. [PDF]
Velmurugan M, Kumar MR.
europepmc +1 more source
A Survey on Proof of Sequential Work: Development, Security Analysis, and Application Prospects. [PDF]
Zhang J +7 more
europepmc +1 more source

