[HTML][HTML] MLS-ABAC: Efficient multi-level security attribute-based access control scheme

SF Aghili, M Sedaghat, D Singelée, M Gupta - Future Generation Computer …, 2022 - Elsevier
Realizing access control to sensitive data offloaded to a Cloud is challenging in the Internet
of Things, where various devices with low computational power and different security levels …

IoT-friendly, pre-computed and outsourced attribute based encryption

M Mahdavi, MH Tadayon, MS Haghighi… - Future Generation …, 2024 - Elsevier
Abstract The Internet of Things (IoT) and its applications are growing at an unprecedented
rate. In such a complex network with an enormous number of nodes, an important challenge …

Hybrid lightweight cryptography with attribute-based encryption standard for secure and scalable IoT system

M Jammula, VM Vakamulla, SK Kondoju - Connection Science, 2022 - Taylor & Francis
ABSTRACT Internet of Things (IoT) devices require lower power consumption with higher
security, which can be achieved by using lightweight cryptography (LWC) approaches …

ABE squared: accurately benchmarking efficiency of attribute-based encryption

A de la Piedra, M Venema, G Alpár - Cryptology ePrint Archive, 2022 - eprint.iacr.org
Measuring efficiency is difficult. In the last decades, several works have contributed in the
quest to successfully determine and compare the efficiency of pairing-based attribute-based …

A key escrow-free KP-ABE scheme and its application in stand-alone authentication in IoT

X He, L Li, H Peng - IEEE Internet of Things Journal, 2023 - ieeexplore.ieee.org
When users access the Internet of Things (IoT) devices, authenticating their identities and
permissions is an important measure to ensure system security and achieve access control …

Load-balanced attribute-based outsourced encryption for constrained IoT devices

M Gasmi, ML Kerdoudi, A Bachir - Computers and Electrical Engineering, 2024 - Elsevier
Abstract The Internet of Things (IoTs) is based on physical sensors that collect data and
transfer it to remote cloud computing platforms for processing and storage. Healthcare …

Achieving privacy-preserving sensitive attributes for large universe based on private set intersection

L Yang, C Li, Y Cheng, S Yu, J Ma - Information Sciences, 2022 - Elsevier
Nowadays, an increasing amount of data has been sent to the cloud for analysis and
storage, and data security in the cloud has been widely concerned. Among them, CP-ABE is …

[HTML][HTML] Secure medical sensor monitoring framework using novel optimal encryption algorithm driven by Internet of Things

J Lekha, K Sandhya, U Archana, C Anilkumar… - Measurement …, 2023 - Elsevier
Recently, healthcare monitoring systems have emerged as significant tolls for constant
monitoring of patient's physiological characteristics. These systems use implanted sensors …

[PDF][PDF] A minimization number of final exponentiations and inversions for reducing the decryption process time in ELiPS-based CP-ABE

Y Nogami - Journal of Advances in Information Technology, 2024 - jait.us
(CP-ABE) is an advanced encryption method used across various fields, including cloud
storage, Personal Health Records, Internet of Things, Internet of Vehicles, and blockchain …

[PDF][PDF] TINYBFT: Byzantine Fault-Tolerant Replication for Highly Resource-Constrained Embedded Systems

H Böhm, T Distler, P Wägemann - Proceedings of the 30th IEEE Real …, 2024 - sys.cs.fau.de
Byzantine fault-tolerant (BFT) state-machine replication offers resilience against a wide
spectrum of faults including hardware crashes, software failures, and attacks. Unfortunately …