Efficient And Secure Hop-By-Hop Message Authentication And Source Privacy In Wireless Sensor Networks [PDF]
security to the data is actually provided by an authentication. Authentication involves a process of confirming an identity. In Wireless sensor networks a lot of message authentication schemes have been developed, based on symmetric-key cryptosystems or ...
Bharatha Lakshmi, N. Vijaya +1 more
core
Advanced encryption schemes in multi-tier heterogeneous internet of things: taxonomy, capabilities, and objectives. [PDF]
Alagheband MR, Mashatan A.
europepmc +1 more source
Fast and Proven Secure Blind Identity-Based Signcryption from Pairings [PDF]
We present the first blind identity-based signcryption (BIBSC). We formulate its security model and define the security notions of blindness and parallel one-more unforgeability (p1m-uf).
Tsz Hon Yuen, Victor K. Wei
core
Privacy Preservation in Smart Meters: Current Status, Challenges and Future Directions. [PDF]
Kua J +3 more
europepmc +1 more source
A Verifiable Ring Signature Scheme of Anonymous Signcryption Using ECC [PDF]
Pratik Gupta, Manoj Kumar
openaire +1 more source
On-Demand Anonymous Access and Roaming Authentication Protocols for 6G Satellite-Ground Integrated Networks. [PDF]
Tao Y, Du H, Xu J, Su L, Cui B.
europepmc +1 more source
Identity based ring signcryption schemes revisited
Ring Signcryption is used to provide a graceful way to leak trustworthy secrets in an anonymous, authenticated and confidential way. To the best of our knowledge, seven identity based ring signcryption schemes were reported in the literature. In this paper, we show that five of them are insecure in one or the other way. We then propose a new scheme and
openaire
Addressing the Challenges of Electronic Health Records Using Blockchain and IPFS. [PDF]
Pilares ICA +4 more
europepmc +1 more source
Prospect of Internet of Medical Things: A Review on Security Requirements and Solutions. [PDF]
Sadhu PK +3 more
europepmc +1 more source

