Review of security methods based on classical cryptography and quantum cryptography

S Subramani, SK Svn - Cybernetics and Systems, 2023 - Taylor & Francis
Classical cryptography is the process of hiding information and it manages the secret
knowledge by encrypting the plain text message through the translation of it to an …

PA-CRT: Chinese remainder theorem based conditional privacy-preserving authentication scheme in vehicular ad-hoc networks

J Zhang, J Cui, H Zhong, Z Chen… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
Existing security and identity-based vehicular communication protocols used in Vehicular Ad-
hoc Networks (VANETs) to achieve conditional privacy-preserving mostly rely on an ideal …

Dual authentication and key management techniques for secure data transmission in vehicular ad hoc networks

P Vijayakumar, M Azees, A Kannan… - IEEE Transactions on …, 2015 - ieeexplore.ieee.org
Vehicular ad hoc networks (VANETs) are an important communication paradigm in modern-
day mobile computing for exchanging live messages regarding traffic congestion, weather …

Password-guessing attack-aware authentication scheme based on chinese remainder theorem for 5g-enabled vehicular networks

MA Al-Shareeda, M Anbar, S Manickam, IH Hasbullah - Applied Sciences, 2022 - mdpi.com
The new fifth-generation (5G) cellular networks dramatically improve the speed of message
transmissions. Most existing authentication schemes that secure 5G communication rely …

A secured storage and privacy-preserving model using CRT for providing security on cloud and IoT-based applications

S Ganapathy - Computer Networks, 2019 - Elsevier
Cloud computing and Internet of Things (IoT) are emerging technologies which have the
capability to enhance the human daily lifestyle. Moreover, the combination of Cloud …

Time efficient secure DNA based access control model for cloud computing environment

S Namasudra, P Roy, P Vijayakumar… - Future Generation …, 2017 - Elsevier
Abstract The uses of Big Data (BD) are gradually increasing in many new emerging
applications, such as Facebook, eBay, Snapdeal, etc. BD is a term, which is used for …

[HTML][HTML] RHAS: robust hybrid auto-scaling for web applications in cloud computing

P Singh, A Kaur, P Gupta, SS Gill, K Jyoti - Cluster Computing, 2021 - Springer
The elasticity characteristic of cloud services attracts application providers to deploy
applications in a cloud environment. The scalability feature of cloud computing gives the …

GroupIt: Lightweight group key management for dynamic IoT environments

YH Kung, HC Hsiao - IEEE Internet of Things Journal, 2018 - ieeexplore.ieee.org
With the proliferation of Internet of Things (IoT) devices that collect sensitive data, access
control is more crucial than ever to safeguard IoT data from unauthorized use. To enforce …

Reliable cooperative authentication for vehicular networks

HJ Jo, IS Kim, DH Lee - IEEE Transactions on Intelligent …, 2017 - ieeexplore.ieee.org
Vehicular ad-hoc networks (VANETs) have been researched with regard to enhance driver's
safety and comfort. In VANETs, all vehicles share their status and road conditions with …

Mutated k-means algorithm for dynamic clustering to perform effective and intelligent broadcasting in medical surveillance using selective reliable broadcast protocol …

M Ramalingam, R Thangarajan - Computer Communications, 2020 - Elsevier
Vehicular ad-hoc Network (VANET) is an emerging type of Mobile ad-hoc Networks
(MANETs) with excellent applications in the intelligent traffic system. Applications in VANETs …