Results 21 to 30 of about 1,315,010 (177)
Studies on the Security of Selected Advanced Asymmetric Cryptographic Primitives [PDF]
The main goal of asymmetric cryptography is to provide confidential communication, which allows two parties to communicate securely even in the presence of adversaries.
Hovd, Martha Norberg
core +1 more source
Stochastic Bat Optimization Model for Secured WSN with Energy‐Aware Quantized Indexive Clustering
The wireless sensor networks (WSNs) with dynamic topology communication among the sensor nodes is vulnerable to numerous attacks. As they have limited power, there arises a conflict between the complex security scheme and the consumption of energy which are inversely proportional to each other.
J. Paruvathavardhini +2 more
wiley +1 more source
Edge‐cloud collaborative application scenario is more complex, it involves collaborative operations among different security domains, frequently accessing and exiting application system of mobile terminals. A cross‐domain identity authentication protocol based on privacy protection is proposed. The main advantages of the protocol are as follows.
Haipeng SUN +5 more
wiley +1 more source
The collection and sharing of electronic health records (EHRs) via the Internet of Things (IoT) can enhance the accuracy of disease diagnosis. However, it is challenging to guarantee the secure search of EHR during the sharing process. The advent of blockchain is a promising solution to address the issues, owing to its remarkable features such as ...
Xueli Nie +5 more
wiley +1 more source
A Hyperelliptic Curve Cryptosystem Based Proxy Promised Signcryption Scheme
Signcryption is the method of combining a digital signature with encryption in a single logical step to get the cryptographic primitives of a public key. However, in addition to signcryption, we sometimes require anonymity and delegation of rights. In this paper, we propose a scheme called proxy promised signcryption to address all of these objectives ...
Farhad Ullah Khan +8 more
wiley +1 more source
Secure Equality Test Technique Using Identity-Based Signcryption for Telemedicine Systems [PDF]
For telemedicine, wireless body area network (WBAN) offers enormous benefits where a patient can be remotely monitored without compromising the mobility of remote treatments. With the advent of high capacity and reliable wireless networks, WBANs are used
Ramadan, Mohammed, Raza, Shahid
core +2 more sources
Signcryption is an authenticated encryption technique that concurrently establishes message confidentiality, authenticity, integrity and non-repudiation.
Renu Mary Daniel +2 more
doaj +1 more source
SF‐LAP: Secure M2M Communication in IIoT with a Single‐Factor Lightweight Authentication Protocol
Machine‐to‐machine communication allows smart devices like sensors, actuators, networks, gateways, and other controllers to communicate with one another. The industrial Internet of things (IIoT) has become a vital component. Many industrial devices are connected to perform a task automatically in machine‐to‐machine communication, but they are not ...
Khurram Shahzad +7 more
wiley +1 more source
Pigeon Inspired Optimization with Encryption Based Secure Medical Image Management System
Presently, technological advancements in the healthcare sector pose a challenging problem relevant to the security and privacy of health‐related applications. Medical images can be considered significant and sensitive data in the medical informatics system.
B. T. Geetha +6 more
wiley +1 more source
Application of Attribute-based Ring Signcryption Scheme in Personal Health Record Cloud [PDF]
Due to the sensitivity of medical data and the identity of the patient,it is required to ensure the security of the patient’s medical,and ensure the patient’s identity information is not leak.Existing schemes meet requirements,but the users with the ...
LIU Xueyan,ZHENG Dengfeng
doaj +1 more source

