Results 11 to 20 of about 423 (151)
Emerging Unmanned Aerial Vehicles (UAVs) have applications for traffic monitoring, public safety, surveillance, agriculture, health services. Collaborative UAVs can form flying ad hoc networks, although such networks are especially vulnerable to security
Nizamud Din +3 more
doaj +3 more sources
Certificateless Generalized Signcryption
AbstractGeneralized Signcryption is a fresh cryptographic primitive that not only can obtain encryption and signature in a single operation, but also provide encryption or signature model alone when needed. This paper proposed a formal definition of certificateless generalized signcryption(CLGSC), then provide the security model of CLGSC.
Ji, Huifang, Han, Wenbao, Zhao, Long
openaire +3 more sources
Provable secure identity based generalized signcryption scheme
According to actual needs, generalized signcryption scheme can flexibly work as an encryption scheme, a signature scheme or a signcryption scheme. In this paper, firstly, we give a security model for identity based generalized signcryption which is more complete than existing model. Secondly, we propose an identity based generalized signcryption scheme.
Yu, Gang +3 more
openaire +5 more sources
With the rising number of patients along with the same time, the comparative evolution in wireless technology has made Body Sensor Networks (BSNs) flourishing in the market.
Jawaid Iqbal +6 more
doaj +3 more sources
An efficient identity based generalized signcryption scheme
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Kushwah, Prashant, Lal, Sunder
openaire +3 more sources
Generalization of signcryption for resources‐constrained environments
AbstractTraditional signcryption is not feasible for some information security scenarios, though it is a new cryptographic primitive that simultaneously fulfills both the functions of signature and encryption.Generalized signcryptionis an adaptive primitive which achieves both secrecy and authenticity or provides them respectively by a generic ...
Yiliang Han
openaire +3 more sources
Optimizing Deep Learning Model for Software Cost Estimation Using Hybrid Meta-Heuristic Algorithmic Approach. [PDF]
Effective software cost estimation significantly contributes to decision‐making. The rising trend of using nature‐inspired meta‐heuristic algorithms has been seen in software cost estimation problems. The constructive cost model (COCOMO) method is a well‐known regression‐based algorithmic technique for estimating software costs.
Ul Hassan CA +7 more
europepmc +2 more sources
Efficient Generalized Signcryption Based on Ecc [PDF]
ABSTRACT In order to obtain promising wireless communication systems, it is necessary to maintain secure message transmissions in unicast, multicast, or broadcast scenarios. The cryptographic primitives can be incorporated when a node needs to submit messages to different receivers as encrypted and/or authenticated one-way messages.
Braeken, An, Porambage, Pawani
openaire +2 more sources
Abstract Due to the realization of 5G technology, the Internet of things (IoT) has made remarkable advancements in recent years. However, security along with data balancing issues is proffered owing to IoT data's growth. The universally unique identifier short input pseudo‐random (SiP) hash‐based elliptic curve cryptography (UUDIS‐ECC) centred secure ...
Kusum Yadav +6 more
wiley +1 more source
Detection of Packet Dropping Attack Based on Evidence Fusion in IoT Networks
Internet of Things (IoT) is widely used in environmental monitoring, smart healthcare, and other fields. Due to its distributed nature, IoT is vulnerable to various internal attacks. One of these attacks is the packet‐dropping attack, which is very harmful.
Weichen Ding +5 more
wiley +1 more source

