A review of signcryption schemes based on hyper elliptic curve

S Ullah, XY Li, L Zhang - 2017 3rd International Conference on …, 2017 - ieeexplore.ieee.org
Now-a-days security is a challenging task in different types of networks, such as Mobile
Networks, Wireless Sensor Networks (WSN) and Radio Frequency Identifications Systems …

A secure and efficient authenticated encryption for electronic payment systems using elliptic curve cryptography

SA Chaudhry, MS Farash, H Naqvi, M Sher - Electronic Commerce …, 2016 - Springer
The use of e-payment system for electronic trade is on its way to make daily life more easy
and convenient. Contrarily, there are a number of security issues to be addressed, user …

Cryptanalysis and enhancement of anonymity preserving remote user mutual authentication and session key agreement scheme for e-health care systems

R Amin, SKH Islam, GP Biswas, MK Khan… - Journal of medical …, 2015 - Springer
The E-health care systems employ IT infrastructure for maximizing health care resources
utilization as well as providing flexible opportunities to the remote patient. Therefore …

An improved and secure biometric authentication scheme for telecare medicine information systems based on elliptic curve cryptography

SA Chaudhry, K Mahmood, H Naqvi… - Journal of Medical Systems, 2015 - Springer
Telecare medicine information system (TMIS) offers the patients convenient and expedite
healthcare services remotely anywhere. Patient security and privacy has emerged as key …

Lightweight and provable secure cross-domain access control scheme for internet of things (IoT) based wireless body area networks (WBAN)

I Ullah, S Zeadally, NU Amin, MA Khan… - Microprocessors and …, 2021 - Elsevier
Abstract Internet of Things (IoT) not only connects the conventional devices for
communication, but also enables low power wireless devices such as sensors, door locks …

A PLS-HECC-based device authentication and key agreement scheme for smart home networks

J Pirayesh, A Giaretta, M Conti, P Keshavarzi - Computer Networks, 2022 - Elsevier
IoT devices permeate our society, collect personal data, and support critical infrastructures
such as the healthcare. Therefore, there is a critical need for authentication and …

BCSoM: Blockchain-based certificateless aggregate signcryption scheme for Internet of Medical Things

A Tomar, S Tripathi - Computer Communications, 2023 - Elsevier
The integration of fog computing and blockchain in the Internet of Medical Things (IoMT)
domain has wholly transformed the healthcare industry and e-health services. In IoMT, the …

An enhanced and provably secure chaotic map-based authenticated key agreement in multi-server architecture

A Irshad, SA Chaudhry, Q Xie, X Li, MS Farash… - Arabian Journal for …, 2018 - Springer
In the multi-server authentication (MSA) paradigm, a subscriber might avail multiple services
of different service providers, after registering from registration authority. In this approach …

[PDF][PDF] 异构系统下的双向签密方案

刘景伟, 张俐欢, 孙蓉 - 电子与信息学报, 2016 - edit.jeit.ac.cn
异构系统下的双向签密方案Mutual Signcryption Schemes under Heterogeneous Systems Page
1 第38 卷第11 期 电子与信息学报 Vol.38No.11 2016年11月 Journal of Electronics & Information …

Enhanced biometric recognition for secure authentication using iris preprocessing and hyperelliptic curve cryptography

V Rajasekar, J Premalatha… - … and mobile computing, 2020 - Wiley Online Library
Biometrics combined with cryptography can be employed to solve the conceptual and
factual identity frauds in digital authentication. Biometric traits are proven to provide …