Blockchain-based privacy preserving e-health system for healthcare data in cloud
G Zhang, Z Yang, W Liu - Computer Networks, 2022 - Elsevier
Cloud-assisted electronic health (e-health) system has played an important role in the
management of healthcare data, which can provide efficient and convenient storage …
management of healthcare data, which can provide efficient and convenient storage …
Ensuring accountability in digital forensics with proxy re-encryption based chain of custody
In the realm of digital forensics, the establishment of robust standards for maintaining the
integrity of digital evidence is of paramount importance. Addressing this concern, this study …
integrity of digital evidence is of paramount importance. Addressing this concern, this study …
A secure privacy preserving and access control scheme for medical internet of things (MIoT) using attribute-based signcryption
RY Patil - International Journal of Information Technology, 2024 - Springer
The proliferation of medical internet of things (MIoT)-enabled medical devices and systems
has completely transformed the healthcare industry. Widespread adoption of MIoT, however …
has completely transformed the healthcare industry. Widespread adoption of MIoT, however …
[HTML][HTML] State-of-the-Art Authentication and Verification Schemes in VANETs: A Survey
ABSTRACT Vehicular Ad-Hoc Networks (VANETs), a subset of Mobile Ad-Hoc Networks
(MANETs), are wire-less networks formed around moving vehicles, enabling communication …
(MANETs), are wire-less networks formed around moving vehicles, enabling communication …
Scpuak: Smart card-based secure protocol for remote user authentication and key agreement
S Cherbal, R Benchetioui - Computers and Electrical Engineering, 2023 - Elsevier
Abstract Internet of Things (IoT) is a fast-growing trend in wireless communication where
various connected objects become an everyday part of our lives. The richness of the network …
various connected objects become an everyday part of our lives. The richness of the network …
A provably secure data sharing scheme for smart gas distribution grid using fog computing
The concept of smart gas distribution grid implies to enhancing current gas distribution grids
by establishing continuous on request and bidirectional data interchange between metering …
by establishing continuous on request and bidirectional data interchange between metering …
An anti-counterfeit and traceable management system for brand clothing with hyperledger fabric framework
Counterfeit products are internationally regarded as “the world's second greatest public
health hazards after drugs”. Counterfeiters produce counterfeit brand clothing and then sell …
health hazards after drugs”. Counterfeiters produce counterfeit brand clothing and then sell …
Secure data sharing in medical cyber-physical system—a review
A Sarode, K Karkhile, S Raskar, RY Patil - Futuristic Trends in Networks …, 2022 - Springer
With the increase in advanced technologies, the health industry has developed a lot
recently. Medical cyber-physical system (MCPS) plays a vital role in this. It consists of …
recently. Medical cyber-physical system (MCPS) plays a vital role in this. It consists of …
E3C: a tool for evaluating communication and computation costs in authentication and key exchange protocol
Today, with the advancement of blockchain and Internet of Things (IoT) technologies, there
is a growing need for authentication protocols and key exchanges to facilitate …
is a growing need for authentication protocols and key exchanges to facilitate …
SDRLAP: A secure lightweight RFID mutual authentication protocol based on PUF with strong desynchronization resistance
T Li, Y Liu, J Ning - Peer-to-Peer Networking and Applications, 2023 - Springer
As one of the key identity authentication technologies in the Internet of Things (IoT), Radio
Frequency Identification (RFID) technology has been widely adopted in various wireless …
Frequency Identification (RFID) technology has been widely adopted in various wireless …