ESCI-AKA: Enabling secure communication in an iot-enabled smart home environment using authenticated key agreement framework
H Alasmary, M Tanveer - Mathematics, 2023 - mdpi.com
Smart home environments are a vital component of the larger ecosystem within smart cities,
aiming to revolutionize residential living through the integration of Internet of Things (IoT) …
aiming to revolutionize residential living through the integration of Internet of Things (IoT) …
CMAP-IoT: Chaotic map-based authentication protocol for crowdsourcing Internet of Things
Abstract Crowdsourcing Internet of Things (IoT) applications have resulted in the
widespread use of smart mobile devices, such as wearable devices and smartphones. E …
widespread use of smart mobile devices, such as wearable devices and smartphones. E …
RDAF-IIoT: Reliable device-access framework for the industrial Internet of Things
H Alasmary - Mathematics, 2023 - mdpi.com
The Internet of Things (IoT) has experienced significant growth and is now a fundamental
part of the next-generation Internet. Alongside improving daily life, IoT devices generate and …
part of the next-generation Internet. Alongside improving daily life, IoT devices generate and …
PFCAS—Paring free certificate less aggregate scheme for ensuring efficient authentication in vehicular Ad-hoc networks
S Jayashree, SVN Santhosh Kumar - Peer-to-Peer Networking and …, 2024 - Springer
In the emerging world the Vehicular Ad-hoc Network (VANET) plays a vital role in the
Intelligent Transportation Sector (ITS). Basically VANET are exposed rapid topology …
Intelligent Transportation Sector (ITS). Basically VANET are exposed rapid topology …
Provably Secure Data Access Control Protocol for Cloud Computing
J Zhang, A Chen, P Zhang - Symmetry, 2023 - mdpi.com
Currently, cloud storage servers are controlled by a third-party administrator. This semi-
trusted approach gives rise to security concerns. Therefore, in cloud computing, some …
trusted approach gives rise to security concerns. Therefore, in cloud computing, some …
Image processing-based protection of privacy data in cloud using NTRU algorithm
K Karthika, RD Priya - Signal, Image and Video Processing, 2024 - Springer
The recent and fast improvements in communication networks and digital technologies have
facilitated the easy transmission and storage of multimedia information on various network …
facilitated the easy transmission and storage of multimedia information on various network …
[PDF][PDF] AN IMPROVED AND EFFICIENT RSA-BASED AUTHENTICATION SCHEME FOR HEALTHCARE SYSTEMS
Owing to the fast advancements of wireless communication, the telehealthcare platform
makes it possible for patients to access healthcare services online. However, creating a …
makes it possible for patients to access healthcare services online. However, creating a …
Redefining Crime Record Storage: An Advanced Architecture Harnessing the Power of Blockchain Technology
Crime record storing is a significant task for law enforcement agencies. Often, they face
challenges in managing and inspecting the records efficiently and securely. Moreover …
challenges in managing and inspecting the records efficiently and securely. Moreover …
Trends and Challenges in AIoT Implementation for Smart Home, Smart Buildings, and Smart Cities in Cloud Platforms
V Santhi, YNVS Sabareesh, PP Sudheer… - Artificial Intelligence of …, 2024 - igi-global.com
Smart homes, smart buildings, and smart cities increase the quality of living by creating a
world that is better and more secure, reducing dependency on human needs and efforts …
world that is better and more secure, reducing dependency on human needs and efforts …
Enhanced Message Authentication Encryption Scheme Based on Physical-Layer Key Generation in Resource-Limited Internet of Things
Z Xing, B Zhao, B Xu, L Wang, G Ren, Z Liu - Available at SSRN 4639419 - papers.ssrn.com
Abstract The Internet of Things (IoT) is facing growing security challenges due to its
vulnerability. It is imperative to address the security issues using lightweight and efficient …
vulnerability. It is imperative to address the security issues using lightweight and efficient …