Results 21 to 30 of about 423 (151)
A Hyperelliptic Curve Cryptosystem Based Proxy Promised Signcryption Scheme
Signcryption is the method of combining a digital signature with encryption in a single logical step to get the cryptographic primitives of a public key. However, in addition to signcryption, we sometimes require anonymity and delegation of rights. In this paper, we propose a scheme called proxy promised signcryption to address all of these objectives ...
Farhad Ullah Khan +8 more
wiley +1 more source
In wireless and mobile networks with limited storage and computing resources, certificateless cryptography has more advantages because of its low dependence on infrastructure and short security parameters. Recently, Gong et al. and Karati et al., respectively, proposed a new certificateless scheme in the Internet of Things environment, one of which is ...
Shan Shan, Jie Cui
wiley +1 more source
Drones, the Internet of Things (IoT), and Artificial Intelligence (AI) could be used to create extraordinary responses to today’s difficulties in smart city challenges. A drone, which would be effectively a data‐gathering device, could approach regions that become complicated, dangerous, or even impossible to achieve for individuals.
Mohamad Reda A. Refaai +6 more
wiley +1 more source
A Novel Forensic Readiness Framework Applicable to the Drone Forensics Field
The Drone Forensics (DRFs) field is a branch of digital forensics, which involves the identification, capture, preservation, reconstruction, analysis, and documentation of drone incidents. Several models have been proposed in the literature for the DRF field, which generally discusses DRF from a reactive forensic perspective; however, the proactive ...
Fahad Mazaed Alotaibi +3 more
wiley +1 more source
Cloud computing is a long‐standing dream of computing as a utility, where users can store their data remotely in the cloud to enjoy on‐demand services and high‐quality applications from a shared pool of configurable computing resources. Thus, the privacy and security of data are of utmost importance to all of its users regardless of the nature of the ...
Junaid Hassan +7 more
wiley +1 more source
In the struggle against population aging, chronic diseases, and a lack of medical facilities, the emergence of Wireless Body Area Networks (WBANs) technology has ushered in optimism. WBANs use a variety of wearable and implanted biosensor nodes to constantly monitor physiological parameters such as oxygen saturation (SpO2), electrocardiogram (ECG ...
Jawaid Iqbal +8 more
wiley +1 more source
Cost‐Effective Proxy Signcryption Scheme for Internet of Things
The Internet of things (IoT) has emerged into a revolutionary technology that enables a wide range of features and applications given the proliferation of sensors and actuators embedded in everyday objects, as well as the ubiquitous availability of high‐speed Internet.
Insaf Ullah +4 more
wiley +1 more source
In the last few years, the wireless body area network (WBAN) has emerged as an appealing and viable option in the e‐health application domain. WBAN technology is primarily used to offer continuous screening of health data to patients, independent of their location, time, or activity.
Fazal Noor +6 more
wiley +1 more source
Distributed Functional Signature with Function Privacy and Its Application
We introduce a novel notion of distributed functional signature. In such a signature scheme, the signing key for function f will be split into n shares skfi and distributed to different parties. Given a message m and a share skfi, one can compute locally and obtain a pair signature (fi(m), σi).
Muhua Liu +4 more
wiley +1 more source
Improved Cryptanalysis of Provable Certificateless Generalized Signcryption [PDF]
Certificateless generalized signcryption adaptively work as certificateless signcryption, signature or encryption scheme having single algorithm for suitable storage-constrained environments. Recently, Zhou et al. proposed a novel Certificates generalized scheme, and proved its ciphertext indistinguishability under adaptive chosen ciphertext attacks ...
Abdul Waheed +5 more
openaire +1 more source

