Security and privacy in IoT-cloud-based e-health systems—A comprehensive review
When the Internet and other interconnected networks are used in a health system, it is
referred to as “e-Health.” In this paper, we examined research studies from 2017–2020 to …
referred to as “e-Health.” In this paper, we examined research studies from 2017–2020 to …
Blockchain-based reliable and efficient certificateless signature for IIoT devices
W Wang, H Xu, M Alazab, TR Gadekallu… - IEEE transactions on …, 2021 - ieeexplore.ieee.org
Nowadays, the Industrial Internet of Things (IIoT) has remarkably transformed our personal
lifestyles and society operations into a novel digital mode, which brings tremendous …
lifestyles and society operations into a novel digital mode, which brings tremendous …
Provably secure and lightweight certificateless signature scheme for IIoT environments
In recent years, two technologies, the cloud computing and the Internet of Things (IoT), have
a synergistic effect in the modern organizations as digitization is a new business trend for …
a synergistic effect in the modern organizations as digitization is a new business trend for …
Efficient and robust certificateless signature for data crowdsensing in cloud-assisted industrial IoT
With the digitalization of various industries, the combination of cloud computing and the
industrial Internet of Things (IIoT) has become an attractive data processing paradigm …
industrial Internet of Things (IIoT) has become an attractive data processing paradigm …
Efficient and provably secure certificateless parallel key-insulated signature without pairing for IIoT environments
With the continuous development of the industrial Internet of Things (IIoT), many
organizations opt for storing the data collected by smart devices on a cloud server for saving …
organizations opt for storing the data collected by smart devices on a cloud server for saving …
A survey of key bootstrapping protocols based on public key cryptography in the Internet of Things
The Internet of Things envisages connecting all physical objects or things to the Internet,
using devices as diverse as smartphones, coffee makers, washing machines, automobiles …
using devices as diverse as smartphones, coffee makers, washing machines, automobiles …
A lightweight continuous authentication protocol for the Internet of Things
YH Chuang, NW Lo, CY Yang, SW Tang - Sensors, 2018 - mdpi.com
Modern societies are moving toward an information-oriented environment. To gather and
utilize information around people's modern life, tiny devices with all kinds of sensing devices …
utilize information around people's modern life, tiny devices with all kinds of sensing devices …
An efficient provably-secure certificateless signature scheme for Internet-of-Things deployment
With the growing popularity of Internet of Things (IoT) in a wide range of applications,
ensuring the communication security of IoT devices is important. Certificateless signature …
ensuring the communication security of IoT devices is important. Certificateless signature …
A secure and efficient certificateless signature scheme for Internet of Things
D Xiang, X Li, J Gao, X Zhang - Ad Hoc Networks, 2022 - Elsevier
Abstract The Internet of Things (IoT) is a new technological innovation, which makes things
intelligent and our life more convenient. To ensure secure communication between smart …
intelligent and our life more convenient. To ensure secure communication between smart …
A new provably secure certificateless signature scheme for Internet of Things
H Du, Q Wen, S Zhang, M Gao - Ad Hoc Networks, 2020 - Elsevier
With the rapid popularization of Internet of Things (IoT) in various fields, the security of the
IoT has been widely concerned. Security authentication technology is the foundation of the …
IoT has been widely concerned. Security authentication technology is the foundation of the …