Abstract In recent years, Personal Health Record (PHR) system has attracted intensive attention due to its universal accessibility and low cost. The practical deployment of PHR …
MA Kiran, SK Pasupuleti, R Eswari - International Journal of Cloud …, 2022 - igi-global.com
Abstract The Internet of Things (IoT) has become a part of our everyday life. Due to limited storage and computational capabilities, data collected by IoT devices outsource to cloud …
RY Patil, YH Patil - International Journal of Information Technology, 2022 - Springer
The medical cyber-physical system (MCPS) has recently received massive consideration with the growth of healthcare 4.0. However, maintaining confidentially of such highly …
S Benzarti, B Triki, O Korbaa - New Trends in Intelligent …, 2018 - ebooks.iospress.nl
By the recent years, the use of UAV (Unmanned Aerial Vehicle) also known as drone have witnessed a remarkable increase. Drones are no longer limited for military services as in the …
Designing an ID based signcryption scheme in the standard model is among the most interesting and important problems in cryptography. However, all the existing systems in the …
A Karati, CI Fan, JJ Huang - Procedia Computer Science, 2020 - Elsevier
Signcryption is one of the recent public key paradigms that satisfies both the requirement of authenticity and confidentiality of messages between parties. However, most of all the …
Y Ming, Y Wang - Int. J. Netw. Secur., 2016 - ijns.jalaxy.com.tw
Identity based signcryption (IBSC) is a novel cryptographic primitive that simultaneously provides the authentication and encryption in a single logic step. The IBSC has been shown …
Identity-based signcryption is a useful cryptographic primitive that provides both authentication and confidentiality for identity-based crypto systems. It is challenging to build …
P Kushwah, S Lal - International Journal of Network Security & Its …, 2012 - academia.edu
Signcryption is a cryptographic primitive which performs encryption and signature in a single logical step with the cost lower than signature-then-encryption approach. Recently, Li et …