In recent years, cloud computing plays a vital role in IT industries. Cloud computing is the sum of software as a service (SaaS) and utility computing (hardware). Elliptic Curve …
Digital signatures are one of the key cryptographic components for providing authenticity and non-repudiation. To circumvent the need of certificates, Shamir in 1984 introduced …
Digital signatures are one of the simplest cryptographic building blocks that provide appealing security characteristics such as authenticity, unforgeability, and undeniability. In …
M Kumar, S Chand - Wireless Personal Communications, 2020 - Springer
The identity-based cryptosystem (IBC) outfits with the most beneficial key management procedures. The IBC is bounded to the small network system due to the internal key escrow …
M Kumar - arXiv preprint arXiv:2307.09610, 2023 - arxiv.org
Elliptic curve cryptography (ECC) is a remarkable mathematical tool that offers the same level of security as traditional public-key cryptography (PKC) with a significantly smaller key …
Wireless sensor networks (WSNs) have become popular in the field of information and communications technology, they are increasingly being used in applications such as …
Smart city is a concept of digitalizing the ecosystem to solve many urban area issues such as crime reduction, transportation, waste management, and governance. However, the …