A novel hybrid encryption method to secure healthcare data in IoT-enabled healthcare infrastructure
S Das, S Namasudra - Computers and Electrical Engineering, 2022 - Elsevier
Nowadays, smart devices are playing a vital role to overtake the conventional healthcare
management system. Here, the Internet of Things (IoT) leads the healthcare industry towards …
management system. Here, the Internet of Things (IoT) leads the healthcare industry towards …
Hybrid cryptography algorithms in cloud computing: A review
it's observed that most people and firms are migrating to the cloud, because the cloud is
much cheaper and convenient. For some computer owners, finding enough storage space to …
much cheaper and convenient. For some computer owners, finding enough storage space to …
Ensuring accountability in digital forensics with proxy re-encryption based chain of custody
In the realm of digital forensics, the establishment of robust standards for maintaining the
integrity of digital evidence is of paramount importance. Addressing this concern, this study …
integrity of digital evidence is of paramount importance. Addressing this concern, this study …
A provably secure data sharing scheme for smart gas distribution grid using fog computing
The concept of smart gas distribution grid implies to enhancing current gas distribution grids
by establishing continuous on request and bidirectional data interchange between metering …
by establishing continuous on request and bidirectional data interchange between metering …
Secure data sharing in medical cyber-physical system—a review
A Sarode, K Karkhile, S Raskar, RY Patil - Futuristic Trends in Networks …, 2022 - Springer
With the increase in advanced technologies, the health industry has developed a lot
recently. Medical cyber-physical system (MCPS) plays a vital role in this. It consists of …
recently. Medical cyber-physical system (MCPS) plays a vital role in this. It consists of …
Digital evidence management system for cybercrime investigation using proxy re-encryption and blockchain
H Chougule, S Dhadiwal, M Lokhande… - Procedia Computer …, 2022 - Elsevier
One of the most beneficial uses of the Internet of Things in cloud is data sharing. As tempting
since this technology is, data security is still one of the issues it faces, as inappropriate data …
since this technology is, data security is still one of the issues it faces, as inappropriate data …
A proxy signcryption scheme for secure sharing of industrial IoT data in fog environment
Rapid technical advancements have transformed the industrial segment. The internet limits
the meaning of industrial IoT (IIoT) to the production Industry, which is Industry 4.0. IIoT …
the meaning of industrial IoT (IIoT) to the production Industry, which is Industry 4.0. IIoT …
Triple phase hybrid cryptography technique in a wireless sensor network
Pooja, RK Chauhan - International Journal of computers and …, 2022 - Taylor & Francis
Security in the wireless networks is the main factor when they are deployed in a harsh
environment, and this is the crucial factor in the case of sensor networks. Cryptography has …
environment, and this is the crucial factor in the case of sensor networks. Cryptography has …
[PDF][PDF] Kriptografi untuk Keamanan Pengiriman Email Menggunakan Blowfish dan Rivest Shamir Adleman (RSA)
Email merupakan media komunikasi jarak jauh melalui internet yang saat ini sering
digunakan untuk kebutuhan pertukaran pesan. Tetapi penggunaan email memiliki …
digunakan untuk kebutuhan pertukaran pesan. Tetapi penggunaan email memiliki …
Digital forensics evidence management based on proxy re-encryption
RY Patil - International Journal of Computer Applications in …, 2022 - inderscienceonline.com
The growing world of digitisation has given rise to cybercrimes. Digital forensics is the
process of collecting lawful evidence. Such evidence plays a very crucial role in the court of …
process of collecting lawful evidence. Such evidence plays a very crucial role in the court of …