Lattice-based public key cryptosystem for internet of things environment: Challenges and solutions
Due to its widespread popularity and usage in many applications (smart transport, energy
management, e-healthcare, smart ecosystem, and so on), the Internet of Things (IoT) has …
management, e-healthcare, smart ecosystem, and so on), the Internet of Things (IoT) has …
Blockchain-envisioned access control for internet of things applications: a comprehensive survey and future directions
With rapid advancements in the technology, almost all the devices around are becoming
smart and contribute to the Internet of Things (IoT) network. When a new IoT device is added …
smart and contribute to the Internet of Things (IoT) network. When a new IoT device is added …
A blockchain based data aggregation and group authentication scheme for electronic medical system
In recent years, due to the rapid development of information techniques and network
technologies, more and more medical documents have been replaced by electronic files for …
technologies, more and more medical documents have been replaced by electronic files for …
Multi-authority CP-ABE-based user access control scheme with constant-size key and ciphertext for IoT deployment
With the ever-increasing rate of adoption of internet-enabled smart devices, the allure of
greater integration of technologies, such as smart home, smart city, and smart grid into …
greater integration of technologies, such as smart home, smart city, and smart grid into …
Healthcare internet of things: Security threats, challenges and future research directions
Internet of Things (IoT) applications are switching from general to precise in different
industries, eg, healthcare, automation, military, maritime, smart cities, transportation …
industries, eg, healthcare, automation, military, maritime, smart cities, transportation …
Analysis on functionalities and security features of Internet of Things related protocols
Abstract The Internet of Things (IoT) paradigm is characterized by the adoption of different
protocols and standards to enable communications among heterogeneous and, often …
protocols and standards to enable communications among heterogeneous and, often …
A survey of key bootstrapping protocols based on public key cryptography in the Internet of Things
The Internet of Things envisages connecting all physical objects or things to the Internet,
using devices as diverse as smartphones, coffee makers, washing machines, automobiles …
using devices as diverse as smartphones, coffee makers, washing machines, automobiles …
RETRACTED ARTICLE: Optimal users based secure data transmission on the internet of healthcare things (IoHT) with lightweight block ciphers
SS Rani, JA Alzubi, SK Lakshmanaprabu… - Multimedia Tools and …, 2020 - Springer
The ever-growing advancement in communication innovation of modern smart objects
carries with it a new era of improvement for the Internet of Things (IoT) based networks. The …
carries with it a new era of improvement for the Internet of Things (IoT) based networks. The …
A lightweight privacy-preserving communication protocol for heterogeneous IoT environment
While Internet-of-Things (IoT) significantly facilitates the convenience of people's daily life,
the lack of security practice raises the risk of privacy-sensitive user data leakage. Securing …
the lack of security practice raises the risk of privacy-sensitive user data leakage. Securing …
A physically secure, lightweight three-factor and anonymous user authentication protocol for IoT
Z Liu, C Guo, B Wang - IEEE Access, 2020 - ieeexplore.ieee.org
Internet of Things has remarkable effects in human's daily life. It is important for users and
sensors to securely access data collected by low-cost sensors via Internet in real-time IoT …
sensors to securely access data collected by low-cost sensors via Internet in real-time IoT …