A survey on attribute-based encryption schemes suitable for the internet of things

M Rasori, M La Manna, P Perazzo… - IEEE Internet of Things …, 2022 - ieeexplore.ieee.org
The Internet of Things (IoT) is an information service paradigm based on the integration of
smart objects, mobile devices, and computers via the Internet. IoT technologies are key …

Challenges and developments in secure routing protocols for healthcare in WBAN: A comparative analysis

R Singla, N Kaur, D Koundal, A Bharadwaj - Wireless Personal …, 2022 - Springer
The rise in life expectancy of humans, COVID-19 pandemic and growing cost of medical
services has brought up huge challenges for the government and healthcare industry. Due …

Attribute-based encryption schemes for next generation wireless IoT networks: a comprehensive survey

Shruti, S Rani, DK Sah, G Gianini - Sensors, 2023 - mdpi.com
Most data nowadays are stored in the cloud; therefore, cloud computing and its extension—
fog computing—are the most in-demand services at the present time. Cloud and fog …

Practical revocable and multi-authority CP-ABE scheme from RLWE for Cloud Computing

Y Yang, J Sun, Z Liu, YQ Qiao - Journal of Information Security and …, 2022 - Elsevier
Cloud computing provides enterprises and individuals with unlimited computing resources
and expandable storage space. However, data leakage occurs frequently due to the lack of …

Assessing the cost of quantum security for automotive over-the-air updates

M La Manna, P Perazzo, L Treccozzi… - 2021 IEEE Symposium …, 2021 - ieeexplore.ieee.org
Over-The-Air (OTA) update is an innovative paradigm that is rapidly spreading through the
automotive industry. Software updates can be capillary distributed thanks to the many …

OSWireless: Enhancing automation for optimizing intent-driven software-defined wireless networks

SK Moorthy, Z Guan, N Mastronarde… - 2022 IEEE 19th …, 2022 - ieeexplore.ieee.org
To control wireless networks with optimized configurations, engineers usually need to
grapple simultaneously with network modeling, algorithm and protocol design as well as …

OSWireless: Hiding specification complexity for zero-touch software-defined wireless networks

SK Moorthy, N Mastronarde, ES Bentley, M Medley… - Computer Networks, 2023 - Elsevier
In the current practice of wireless engineering, to optimize wireless networks engineers
usually need to grapple simultaneously with network modeling, algorithm and protocol …

Tiny keys hold big secrets: On efficiency of Pairing-Based Cryptography in IoT

P Perazzo, C Vallati - Internet of Things, 2025 - Elsevier
Abstract Pairing-Based Cryptography (PBC) is a sub-field of elliptic curve cryptography that
has been used to design ingenious security protocols including Short Signatures (SS) …

Privacy‐preserving and fine‐grained data sharing for resource‐constrained healthcare CPS devices

Y Bao, W Qiu, X Cheng - Expert Systems, 2023 - Wiley Online Library
Medical cyber‐physical systems (CPS) provide the possibility for real‐time health monitoring
of patients and flexible diagnostic services based on expert systems by collaboratively …

HRSE: A novel high-speed random sampling encryption scheme on big data

J Peng, H Xu, J Song - … Conference on Big Data Science and …, 2021 - ieeexplore.ieee.org
The security and privacy protection of big data have attracted lots of attentions in recent
years. The volume characteristic of big data puts forward the higher requirements in terms of …