Elliptic Curve Cryptography; Applications, challenges, recent advances, and future trends: A comprehensive survey

S Ullah, J Zheng, N Din, MT Hussain, F Ullah… - Computer Science …, 2023 - Elsevier
Elliptic Curve (EC) is the most recent and advanced technique of Elliptic Curve
Cryptography (ECC). EC is often used to improve the security of open communication …

Certificateless signature schemes in Industrial Internet of Things: A comparative survey

S Hussain, SS Ullah, I Ali, J Xie, VN Inukollu - Computer Communications, 2022 - Elsevier
Abstract Internet of Things (IoT), which is a growing domain, provides a universal connection
to the Internet by spinning common objects to connected ones by changing the way people …

[HTML][HTML] Towards the design of efficient and secure architecture for software-defined vehicular networks

M Adnan, J Iqbal, A Waheed, NU Amin, M Zareei… - Sensors, 2021 - mdpi.com
Recently, by the rapid development of Vehicular Ad Hoc Networks (VANETs) and the
advancement of Software Defined Networking (SDN) as an emerging technology, the …

A provably secure data sharing scheme for smart gas distribution grid using fog computing

RY Patil, YH Patil, R Kachhoria, S Lonare - International Journal of …, 2022 - Springer
The concept of smart gas distribution grid implies to enhancing current gas distribution grids
by establishing continuous on request and bidirectional data interchange between metering …

Cryptanalysis of an online/offline certificateless signature scheme for Internet of Health Things

S Hussain, SS Ullah… - Intelligent …, 2021 - researchportal.murdoch.edu.au
Abstract Recently, Khan et al.[An online-offline certificateless signature scheme for internet
of health things,” Journal of Healthcare Engineering, vol. 2020] presented a new …

Certificateless proxy signcryption in the standard model for a UAV network

Y Qu, J Zeng - IEEE Internet of Things Journal, 2022 - ieeexplore.ieee.org
As we all know, the random oracle model (ROM) is a simulation of the hash function and
cannot replace the actual computation of hash function and the public-key cryptography …

[HTML][HTML] An efficient online/offline heterogeneous proxy signcryption for secure communication in UAV networks

NW Hundera, W Shumeng, D Mesfin, H Xu… - Journal of King Saud …, 2024 - Elsevier
The rapid growth of the Internet of Things (IoT) has led to an increased deployment of
unmanned aerial vehicles (UAVs) across various sectors. However, efficiency and security …

PDF Malware Detection: Towards Machine Learning Modeling with Explainability Analysis

GMS Hossain, K Deb, H Janicke, IH Sarker - IEEE Access, 2024 - ieeexplore.ieee.org
The Portable Document Format (PDF) is one of the most widely used file types, thus
fraudsters insert harmful code into victims' PDF documents to compromise their equipment …

Secure and Compact: A New Variant of McEliece Cryptosystem

E Bindal, AK Singh - IEEE Access, 2024 - ieeexplore.ieee.org
This paper introduces a variant of the McEliece cryptosystem and employs the-construction
to generate a new code from two arbitrary linear codes. We propose an efficient hard …

A low-complexity, energy-efficient data securing model for wireless sensor network based on linearly complex voice encryption mechanism of GSM technology

MS Khan, NM Khan, A Khan, F Aadil… - International …, 2021 - journals.sagepub.com
A wireless sensor network is the formation of a temporary network of sensor nodes equipped
with limited resources working in an ad hoc environment. Routing protocol is one of the key …