A Karati, CI Fan, RH Hsu - IEEE Internet of Things Journal, 2019 - ieeexplore.ieee.org
The Internet of Things (IoT) is revolutionizing our modern lives by introducing active connection between smart devices. However, IoT devices are repeatedly exhibiting many …
J Iqbal, AI Umar, N Amin… - International Journal of …, 2019 - journals.sagepub.com
In body sensor networks, both wearable and implantable biosensors are deployed in a patient body to monitor and collect patient health record information. The health record …
Industrial Internet of Things (IIoT) is a new type of Internet of Things (IoT), which enables sensors to merge with several smart devices to monitor machine status, environment, and …
Z Eslami, N Pakniat - Journal of King Saud University-Computer and …, 2014 - Elsevier
The concept of aggregate signcryption was first introduced in 2009 by Selvi et al.[Identity based aggregate signcryption schemes, Lecture Notes in Computer Science 5922 LNCS …
This paper found that a novel hyper-chaotic based image encryption scheme is vulnerable to chosen plaintext attack. By performing permutation before the vector partition and adding …
Rivest, Shamir, & Adleman (RSA), bilinear pairing, and elliptic curve are well-known techniques/algorithms for security protocols. These techniques suffer from higher …
C Zhou, W Zhou, X Dong - Designs, codes and cryptography, 2014 - Springer
Generalized signcryption can adaptively work as an encryption scheme, a signature scheme or a signcryption scheme with only one algorithm. It is very suitable for storage-constrained …