Results 11 to 20 of about 5,722 (251)
A Publicly Verifiable Leveled Fully Homomorphic Signcryption Scheme
With the deepening of research, how to construct a fully homomorphic signcryption scheme based on standard assumptions is a problem that we need to solve. For this question, recently, Jin et al.
Zhaoxuan Bian +5 more
doaj +2 more sources
A Certificateless Online/Offline Signcryption Scheme for Power Terminal Equipment [PDF]
With the continuous development of power energy Internet, the power monitoring system has become a key infrastructure responsible for monitoring and controlling the operations of a power system.
Bin LI, Po WU, Dan WANG, Haoyang AN, Debiao HE
doaj +1 more source
New Certificateless Generalized Signcryption Scheme for Internet of Things Environment [PDF]
Certificateless generalized signcryption (CLGSC) scheme has been widely applied in resource-limited IoT environments for they could not only solve the problems of the certificate management and key escrow,but also serve as encryption,signature,or ...
ZHANG Zhen-chao, LIU Ya-li, YIN Xin-chun
doaj +1 more source
Hybrid lightweight Signcryption scheme for IoT
The information transmitted in IoT is susceptible to affect the user’s privacy, and hence the information ought to be transmitted securely. The conventional method to assure integrity, confidentiality, and non-repudiation is to first sign the message and
Sruthi M., Rajasekaran Rajkumar
doaj +1 more source
SIS‐AODV consist of Ant Colony Grey Wolf Optimisation (ACGWO) over AODV algorithm to improve network performance while implementing security algorithm over MANET. Analysis results shows maximum performance with the PDR of 98% and throughput of 85%. In addition, end‐to‐end delay is reduced up‐to 25% and routing overhead decrease up‐to 20%. Abstract In a
Anita R. Patil, Gautam M. Borkar
wiley +1 more source
Improved SRP algorithm and bidirectional heterogeneous LTE‐R authentication key
LTE‐R is the next generation of high‐speed railway wireless communication system in China, and its security is of important practical significance to ensure safe operation of trains. Animproved SRP algorithm and a two‐way heterogeneous LTE‐R authentication key agreement scheme are proposed.
Yong Chen, Ting Chang, Wen Liu
wiley +1 more source
Stochastic Bat Optimization Model for Secured WSN with Energy‐Aware Quantized Indexive Clustering
The wireless sensor networks (WSNs) with dynamic topology communication among the sensor nodes is vulnerable to numerous attacks. As they have limited power, there arises a conflict between the complex security scheme and the consumption of energy which are inversely proportional to each other.
J. Paruvathavardhini +2 more
wiley +1 more source
Provably Secure and Lightweight Patient Monitoring Protocol for Wireless Body Area Network in IoHT
As one of the important applications of Internet of Health Things (IoHT) technology in the field of healthcare, wireless body area network (WBAN) has been widely used in medical therapy, and it can not only monitor and record physiological information but also transmit the data collected by sensor devices to the server in time.
Qi Xie +5 more
wiley +1 more source
Securing Topology Control in SDWSNs Using Identity‐Based Cryptography
In software‐defined wireless sensor networks (SDWSNs), topology control is a fundamental procedure to maintain the global network topology. However, the open wireless channels of SDWSNs make it possible for an attacker to eavesdrop, replay, or modify the topology messages, thus posing a great threat to the network operations.
Rui Wang +11 more
wiley +1 more source
Blockchain‐Based Privacy‐Preserving Sensor Data Sharing with Fine‐Grained Authorization in Microgrid
Microgrid is a power system that includes various energy sources (e.g., solar panels and wind turbines), where a number of device status and sensing data are collected and transmitted by smart sensors. Based on sensing‐as‐a‐service in microgrid, sensor owners and sensor data consumers can effectively perform data sharing operations.
Jinhu Yu +5 more
wiley +1 more source

