OOS-SSS: An efficient online/offline subtree-based short signature scheme using Chebyshev chaotic maps for wireless sensor network

C Meshram, CC Lee, SG Meshram, A Meshram - IEEE Access, 2020 - ieeexplore.ieee.org
Wireless sensor network (WSN) is a network system that involves spatially distributed
devices such as wireless sensor nodes. As the data collected by the sensor nodes and …

An efficient online/offline ID-based short signature procedure using extended chaotic maps

C Meshram, CT Li, SG Meshram - Soft Computing, 2019 - Springer
Chaos has been dealt with a decent approach to reduce computational complexity while
fulfilling security necessities of a cryptographic techniques. In this article, we purpose an …

Intelligent target cell selection algorithm for low latency 5G networks

VO Nyangaresi, MA Al Sibahee, ZA Abduljabbar… - … : Selected Papers from …, 2022 - Springer
Security and efficiency during the handover process are critical challenges in 5G
heterogeneous networks owing to its strict low latency and security requirements. The 5G …

Enhanced security using proxy signcryption technique for wireless mesh networks

S Singla, P Sharma, PK Sharma - International Journal of System …, 2023 - Springer
Authentication delay is the main requirement for handoff in wireless mesh networks when
mobile client moves from one domain to another. In order to solve the problems, we propose …

Analysis of handover authentication protocols for mobile wireless networks using identity-based public key cryptography

D He, S Zeadally, L Wu, H Wang - Computer Networks, 2017 - Elsevier
The handover authentication protocol plays an important role in mobile wireless networks
where mobile devices often need to securely and seamlessly roam among different access …

New vertical handover method to optimize utilization of wireless local area network in high-speed environment

HT Yew, E Supriyanto, MH Satria, YW Hau - Plos one, 2016 - journals.plos.org
In heterogeneous wireless networks, wireless local area network (WLAN) is highly preferred
by mobile terminals (MTs) owing to its high transmission bandwidth and low access cost …

An efficient procedure for online/offline ID‐based signature using extended chaotic maps and group ring

G Mittal, S Kumar, S Kumar - Security and Privacy, 2023 - Wiley Online Library
In this article, we utilize the notions of extended chaotic maps and group ring to propose an
efficient procedure for online/offline identity based (ID‐based) signature. The main purpose …

Parallel point-multiplication architecture using combined group operations for high-speed cryptographic applications

MS Hossain, E Saeedi, Y Kong - Plos one, 2017 - journals.plos.org
In this paper, we propose a novel parallel architecture for fast hardware implementation of
elliptic curve point multiplication (ECPM), which is the key operation of an elliptic curve …

[PDF][PDF] Delay sensitive protocol for high availability LTE handovers

VO Nyangaresi, SO Abeka, AJ Rodrigues - 2020 - researchgate.net
Long delays during the handover process lead to dropped calls which deteriorate the
network quality of service. In addition, these delays impede the incorporation of …

An Efficient Conformable Fractional Chaotic Map‐Based Online/Offline IBSS Scheme for Provable Security in ROM

C Meshram, RW Ibrahim, RM Elobaid - Complexity, 2022 - Wiley Online Library
Chaos distributes with a covert method to condense the dynamic of complexity and satisfies
the security requirements of a cryptographic system. This study gives an ability online/offline …