Blockchain‐based patient centric health care communication system
VS Naresh, S Reddi… - International Journal of …, 2021 - Wiley Online Library
The rapid increase in health care data breaches with the existing centralized systems
emphasizes a decentralized health care system while ensuring reliability, privacy, security …
emphasizes a decentralized health care system while ensuring reliability, privacy, security …
Provable secure lightweight hyper elliptic curve‐based communication system for wireless sensor networks
VS Naresh, R Sivaranjani… - International Journal of …, 2018 - Wiley Online Library
It is widely believed that hyper elliptic curve cryptosystems (HECCs) are not attractive for
wireless sensor network because of their complexity compared with systems based on lower …
wireless sensor network because of their complexity compared with systems based on lower …
A group key agreement protocol based on ecdh and short signature
Z Yang, Z Wang, F Qiu, F Li - Journal of Information Security and …, 2023 - Elsevier
A group key agreement protocol allows a set of users to establish a common session key
over an open network. A dynamic contributory group key agreement (DCGKA) protocol …
over an open network. A dynamic contributory group key agreement (DCGKA) protocol …
Provably secure blockchain privacy-preserving smart contract centric dynamic group key agreement for large WSN
VS Naresh, VVLD Allavarpu, S Reddi - The Journal of Supercomputing, 2022 - Springer
Abstract The contemporary Group Key Agreement (GKA) entails lightweight computing,
reduced communication, decentralized certification, personal privacy protection, traceability …
reduced communication, decentralized certification, personal privacy protection, traceability …
A provably secure sharding based blockchain smart contract centric hierarchical group key agreement for large wireless ad‐hoc networks
VS Naresh, VVLD Allavarpu, S Reddi… - Concurrency and …, 2022 - Wiley Online Library
Group key management with privacy preserving and trust still remains a precarious and
stimulating issue for securing multicast communications in an energy embarrassed large …
stimulating issue for securing multicast communications in an energy embarrassed large …
A provably secure cluster-based hybrid hierarchical group key agreement for large wireless ad hoc networks
VS Naresh, S Reddi, NVES Murthy - Human-centric Computing and …, 2019 - Springer
Group key agreement protocol permits a set of users to create a common key to make sure
security of information exchange among members of the group. It is extensively used in …
security of information exchange among members of the group. It is extensively used in …
Provable secure dynamic lightweight group communication in VANETs
VS Naresh, S Reddi… - Transactions on Emerging …, 2024 - Wiley Online Library
The advent of group‐oriented communication applications in Vehicular Ad Hoc Networks
(VANETs) has trigger research on lightweight privacy‐preserving Secure Group …
(VANETs) has trigger research on lightweight privacy‐preserving Secure Group …
A secure group communication approach for tactical network environments
F Poltronieri, R Fronteddu, C Stefanelli… - 2018 International …, 2018 - ieeexplore.ieee.org
Group communication protocols that utilize multicast or local broadcast transmissions are
more efficient than point-to-point protocols when disseminating the same information to …
more efficient than point-to-point protocols when disseminating the same information to …
[PDF][PDF] Comparative analysis of MOD-ECDH algorithm and various algorithms
Cryptography has remained a well-known and well-researched topic for ages. It is the first
line of defense for any networked system. A lot of algorithms have been developed using …
line of defense for any networked system. A lot of algorithms have been developed using …
Blockchain privacy‐preserving smart contract centric multiple multiparty key agreement over large WANETs
VS Naresh, VVLD Allavarpu… - Transactions on Emerging …, 2021 - Wiley Online Library
With the rapid increase in the popularity of groupware applications whose security mainly
relied on the key being used, which made multi‐party/group secret key agreements …
relied on the key being used, which made multi‐party/group secret key agreements …