Results 21 to 30 of about 1,315,010 (177)

Studies on the Security of Selected Advanced Asymmetric Cryptographic Primitives [PDF]

open access: yes, 2022
The main goal of asymmetric cryptography is to provide confidential communication, which allows two parties to communicate securely even in the presence of adversaries.
Hovd, Martha Norberg
core   +1 more source

Stochastic Bat Optimization Model for Secured WSN with Energy‐Aware Quantized Indexive Clustering

open access: yesJournal of Sensors, Volume 2023, Issue 1, 2023., 2023
The wireless sensor networks (WSNs) with dynamic topology communication among the sensor nodes is vulnerable to numerous attacks. As they have limited power, there arises a conflict between the complex security scheme and the consumption of energy which are inversely proportional to each other.
J. Paruvathavardhini   +2 more
wiley   +1 more source

An Edge‐Cloud Collaborative Cross‐Domain Identity‐Based Authentication Protocol with Privacy Protection

open access: yesChinese Journal of Electronics, Volume 31, Issue 4, Page 721-731, July 2022., 2022
Edge‐cloud collaborative application scenario is more complex, it involves collaborative operations among different security domains, frequently accessing and exiting application system of mobile terminals. A cross‐domain identity authentication protocol based on privacy protection is proposed. The main advantages of the protocol are as follows.
Haipeng SUN   +5 more
wiley   +1 more source

Time‐Enabled and Verifiable Secure Search for Blockchain‐Empowered Electronic Health Record Sharing in IoT

open access: yesSecurity and Communication Networks, Volume 2022, Issue 1, 2022., 2022
The collection and sharing of electronic health records (EHRs) via the Internet of Things (IoT) can enhance the accuracy of disease diagnosis. However, it is challenging to guarantee the secure search of EHR during the sharing process. The advent of blockchain is a promising solution to address the issues, owing to its remarkable features such as ...
Xueli Nie   +5 more
wiley   +1 more source

A Hyperelliptic Curve Cryptosystem Based Proxy Promised Signcryption Scheme

open access: yesSecurity and Communication Networks, Volume 2022, Issue 1, 2022., 2022
Signcryption is the method of combining a digital signature with encryption in a single logical step to get the cryptographic primitives of a public key. However, in addition to signcryption, we sometimes require anonymity and delegation of rights. In this paper, we propose a scheme called proxy promised signcryption to address all of these objectives ...
Farhad Ullah Khan   +8 more
wiley   +1 more source

Secure Equality Test Technique Using Identity-Based Signcryption for Telemedicine Systems [PDF]

open access: yes, 2023
For telemedicine, wireless body area network (WBAN) offers enormous benefits where a patient can be remotely monitored without compromising the mobility of remote treatments. With the advent of high capacity and reliable wireless networks, WBANs are used
Ramadan, Mohammed, Raza, Shahid
core   +2 more sources

A forward secure signcryption scheme with ciphertext authentication for e-payment systems using conic curve cryptography

open access: yesJournal of King Saud University: Computer and Information Sciences, 2021
Signcryption is an authenticated encryption technique that concurrently establishes message confidentiality, authenticity, integrity and non-repudiation.
Renu Mary Daniel   +2 more
doaj   +1 more source

SF‐LAP: Secure M2M Communication in IIoT with a Single‐Factor Lightweight Authentication Protocol

open access: yesJournal of Sensors, Volume 2022, Issue 1, 2022., 2022
Machine‐to‐machine communication allows smart devices like sensors, actuators, networks, gateways, and other controllers to communicate with one another. The industrial Internet of things (IIoT) has become a vital component. Many industrial devices are connected to perform a task automatically in machine‐to‐machine communication, but they are not ...
Khurram Shahzad   +7 more
wiley   +1 more source

Pigeon Inspired Optimization with Encryption Based Secure Medical Image Management System

open access: yesComputational Intelligence and Neuroscience, Volume 2022, Issue 1, 2022., 2022
Presently, technological advancements in the healthcare sector pose a challenging problem relevant to the security and privacy of health‐related applications. Medical images can be considered significant and sensitive data in the medical informatics system.
B. T. Geetha   +6 more
wiley   +1 more source

Application of Attribute-based Ring Signcryption Scheme in Personal Health Record Cloud [PDF]

open access: yesJisuanji gongcheng, 2017
Due to the sensitivity of medical data and the identity of the patient,it is required to ensure the security of the patient’s medical,and ensure the patient’s identity information is not leak.Existing schemes meet requirements,but the users with the ...
LIU Xueyan,ZHENG Dengfeng
doaj   +1 more source

Home - About - Disclaimer - Privacy