An elliptic curve cryptography based certificate-less signature aggregation scheme for efficient authentication in vehicular ad hoc networks

Y Rajkumar, SVNS Kumar - Wireless Networks, 2024 - Springer
The main advantage of Vehicular Adhoc Networks being an inherent part of Intelligent
Transportation Systems is to ensure the safety and comfort of commuters on the roads. In …

Authentication methods for UAV communication

M Rodrigues, J Amaro, FS Osório… - 2019 IEEE symposium …, 2019 - ieeexplore.ieee.org
Unmanned Aerial Systems (UASs) are being employed in many different applications, and
with the increased usage security concerns become more accentuated. Communication …

Sensor data protection through integration of blockchain and camouflaged encryption in cyber-physical manufacturing systems

Z Shi, B Oskolkov, W Tian… - … of Computing and …, 2024 - asmedigitalcollection.asme.org
The advancement of sensing technology enables efficient data collection from
manufacturing systems for monitoring and control. Furthermore, with the rapid development …

RSA Cryptographic Algorithm using Cubic Congruential Generator

N Khairina, MK Harahap - Journal of Physics: Conference Series, 2019 - iopscience.iop.org
In the field of cryptography, the key and procedures for converting messages into secret
messages have a very important role. The RSA key is built with a random number generator …

A secure IoT-based mutual authentication for healthcare applications in wireless sensor networks using ECC

D Singh, B Kumar, S Singh, S Chand - International Journal of …, 2021 - igi-global.com
The role of wireless medical sensor networks (WMSNs) is very significant in healthcare
applications of IoT. Online report generation and sharing the reports reduce the time and …

Efficient VANET safety message delivery and authenticity with privacy preservation

TM Mohamed, IZ Ahmed, RA Sadek - PeerJ Computer Science, 2021 - peerj.com
Vehicular ad-hoc networks (VANETs) play an essential role in the development of the
intelligent transportation system (ITS). VANET supports many types of applications that have …

[PDF][PDF] A review on elliptic curve cryptography

M Al Saadi, O Muscat, B Kumar - Int. J. Future Gener. Commun …, 2020 - researchgate.net
Cryptography has many algorithms that are used to secure the communication and make the
data exchange between the sender and receiver safe and protected from the attackers. The …

[HTML][HTML] WITHDRAWN: A Secure and Efficient Blockchain-Powered Scheme for e-Invoicing Application

HL Lee, CH Tsai - 2024 - Elsevier
WITHDRAWN: A Secure and Efficient Blockchain-Powered Scheme for e-Invoicing
Application - ScienceDirect Skip to main contentSkip to article Elsevier logo Journals & …

Temporal ECDSA: A timestamp and signature mask enabled ECDSA algorithm for IoT client node authentication

JJ Puthiyidam, S Joseph, B Bhushan - Computer Communications, 2024 - Elsevier
Abstract Internet of Things (IoT) networks are vulnerable to various security threats,
especially in client authentication. The current authentication methods require significant …

Intensifying multimedia information security using comprehensive cipher

V Nikhila, C Rupa - 2019 Innovations in Power and Advanced …, 2019 - ieeexplore.ieee.org
Now a days the world is getting digitalized. The digital technologies are important in
everyday life. In this digital world providing security to sensitive data like medical records …