Blockchain-based privacy preserving e-health system for healthcare data in cloud

G Zhang, Z Yang, W Liu - Computer Networks, 2022 - Elsevier
Cloud-assisted electronic health (e-health) system has played an important role in the
management of healthcare data, which can provide efficient and convenient storage …

Ensuring accountability in digital forensics with proxy re-encryption based chain of custody

RY Patil, YH Patil, A Bannore, M Ranjanikar - International Journal of …, 2024 - Springer
In the realm of digital forensics, the establishment of robust standards for maintaining the
integrity of digital evidence is of paramount importance. Addressing this concern, this study …

A secure privacy preserving and access control scheme for medical internet of things (MIoT) using attribute-based signcryption

RY Patil - International Journal of Information Technology, 2024 - Springer
The proliferation of medical internet of things (MIoT)-enabled medical devices and systems
has completely transformed the healthcare industry. Widespread adoption of MIoT, however …

[HTML][HTML] State-of-the-Art Authentication and Verification Schemes in VANETs: A Survey

S Mazhar, A Rakib, L Pan, F Jiang, A Anwar… - Vehicular …, 2024 - Elsevier
ABSTRACT Vehicular Ad-Hoc Networks (VANETs), a subset of Mobile Ad-Hoc Networks
(MANETs), are wire-less networks formed around moving vehicles, enabling communication …

Scpuak: Smart card-based secure protocol for remote user authentication and key agreement

S Cherbal, R Benchetioui - Computers and Electrical Engineering, 2023 - Elsevier
Abstract Internet of Things (IoT) is a fast-growing trend in wireless communication where
various connected objects become an everyday part of our lives. The richness of the network …

A provably secure data sharing scheme for smart gas distribution grid using fog computing

RY Patil, YH Patil, R Kachhoria, S Lonare - International Journal of …, 2022 - Springer
The concept of smart gas distribution grid implies to enhancing current gas distribution grids
by establishing continuous on request and bidirectional data interchange between metering …

An anti-counterfeit and traceable management system for brand clothing with hyperledger fabric framework

CL Chen, X Shang, WJ Tsaur, W Weng, YY Deng… - Symmetry, 2021 - mdpi.com
Counterfeit products are internationally regarded as “the world's second greatest public
health hazards after drugs”. Counterfeiters produce counterfeit brand clothing and then sell …

Secure data sharing in medical cyber-physical system—a review

A Sarode, K Karkhile, S Raskar, RY Patil - Futuristic Trends in Networks …, 2022 - Springer
With the increase in advanced technologies, the health industry has developed a lot
recently. Medical cyber-physical system (MCPS) plays a vital role in this. It consists of …

E3C: a tool for evaluating communication and computation costs in authentication and key exchange protocol

Y Salami, V Khajehvand, E Zeinali - Iran Journal of Computer Science, 2024 - Springer
Today, with the advancement of blockchain and Internet of Things (IoT) technologies, there
is a growing need for authentication protocols and key exchanges to facilitate …

SDRLAP: A secure lightweight RFID mutual authentication protocol based on PUF with strong desynchronization resistance

T Li, Y Liu, J Ning - Peer-to-Peer Networking and Applications, 2023 - Springer
As one of the key identity authentication technologies in the Internet of Things (IoT), Radio
Frequency Identification (RFID) technology has been widely adopted in various wireless …