Evaluating pairing-free identity-based identification using curve25519

J Chia, JJ Chin, SC Yip - Advances in Cyber Security: Second International …, 2021 - Springer
Identification schemes are cryptographic primitives that enable strong authentication for
access control mechanisms that are critical to the security of computerized systems. To …

Anomaly Detection in IoT Sensor Networks using Machine Learning

K Mithran, C Gopi - 2022 International Conference on …, 2022 - ieeexplore.ieee.org
Anomaly Detection is a promising new approach for quality control in wireless networks and
telecommunication networks. New modern network architecture enables intensive …

Mobile App Secure Authentication for Unified Software Architecture for Smart Computing IoT Devices

R Chadha, S Khullar, V Kaushik - Journal of Advanced …, 2023 - thejournalshouse.com
IoT devices connect everything to the internet in this century. This allows users to remotely
access and operate their equipment. Internet of Things (IoT) gadgets save time, allow …

Knee Functional Telerehabilitation System for Inclusive Smart Cities Based on Assistive IoT Technologies

M El Fezazi, M Aqil, A Jbari, A Jilbab - … Edition 3: The Proceedings of the …, 2020 - Springer
In the current smart cities, assistive IoT technologies are employed in several services to
improve the physical and social functioning of persons with disabilities (PwD) and elderly …

The Internet of Things: Addressing the risks of smart homes: An analysis of Internet of Things-based smart homes from a security standpoint

M Seffer - 2023 - diva-portal.org
The security aspects of the Internet of Things (IoT) have become increasingly important as
the number of connected devices continues to grow. This study presents a thorough analysis …

[PDF][PDF] Monitoring Connectivity of Internet of Things Device on Zigbee Protocol

BPS Kurniabudi, SDB Jambi, SDB Jambi - repository.unsri.ac.id
Internet of Things (IoT) networks operators may not be fully aware whether each IoT device
in their network is functioning safe enough from cyber-attacks. This paper develops an IoT …

[PDF][PDF] A Pairing-Free Identity-Based Identification Scheme with Tight Security Using Modified-Schnorr Signatures. Symmetry 2021, 13, 1330

J Chia, JJ Chin, SC Yip - 2021 - academia.edu
The security of cryptographic schemes is proven secure by reducing an attacker which
breaks the scheme to an algorithm that could be used to solve the underlying hard …

Routing protocols: Key security issues and challenges in IoT, ad hoc, and sensor networks

C Kumara, S Prakashb - Security and Privacy Issues in IoT …, 2020 - books.google.com
The world is rapidly shifting toward a new era of communication where not only human but
also every device due to inherent capability to communicate is trying to connect with other …