A review on several critical issues and challenges in IoT based e-healthcare system

M Shamila, K Vinuthna, AK Tyagi - … international conference on …, 2019 - ieeexplore.ieee.org
Due to recent development in smart/electronic devices or computing devices, a lot of data
(called Big Data) is being generated. This data in simple terms is called as" Large Data" or" …

Secret sharing scheme for group authentication—A review

SK Narad, MR Sayankar, SV Alone… - 2017 International …, 2017 - ieeexplore.ieee.org
User authentication is the most important security services for communication purpose.
Group Authentication authenticates all users belonging to the same group is proposed in …

Distributed secret sharing scheme based on the high-dimensional rotation paraboloid

S Qin, Z Tan, B Zhang, F Zhou - Journal of Information Security and …, 2021 - Elsevier
Secret sharing of (k, n)-threshold is naturally used to assist in security-assurance
applications in smart systems. It can ensure a high level of data security and reliability. Most …

Neural network based group authentication using (n, n) secret sharing scheme

SK Narad, PV Chavan - 2015 International Conference on …, 2015 - ieeexplore.ieee.org
In recent days, usage of internet is increasing so; authentication becomes the most important
security services for communication purpose. Keeping this into consideration, there is need …

Vector space multisecret-sharing scheme based on Blakley's method

S Çalkavur, P Solé - 1st International Conference on Frontiers of …, 2023 - hal.science
Secret sharing schemes were introduced by Adi Shamir and George Blakley, independently,
in 1979. In a $(k, n) $-threshold secret sharing scheme, any set of at least $ k $ out of $ n …

Signature restoration for enhancing robustness of fpga ip designs

J Long, D Zhang, W Liang - International Journal of Information …, 2015 - igi-global.com
Many watermarking techniques for intellectual property (IP) protection are not resilient to
tampering or removal attacks, especially for field programmable gate array (FPGA)-based IP …

Threshold secret sharing through multivariate Birkhoff interpolation

VE Markoutis, GC Meletiou, AN Veneti… - … , and Network Security, 2015 - Springer
Secret sharing schemes have been well studied and widely used in different aspects of real
life applications. The original secret sharing scheme was proposed by Adi Shamir in 1979. A …

A Fault-Tolerant Watermarking Algorithm for FPGA IP Protection

J Long, D Zhang, W Liang, W Li - 2015 IEEE Trustcom …, 2015 - ieeexplore.ieee.org
Intellectual Property (IP) is difficult to identify when the watermarks are impaired in previous
work. To address this issue, we propose a fault-tolerant watermarking scheme for FPGA IP …

A distributed login framework for semi-structured Peer-to-Peer networks

X Hei, X Du, B Song - 2012 IEEE International Conference on …, 2012 - ieeexplore.ieee.org
In Peer-to-Peer (P2P) networks, security is a challenging issue due to decentralization. In
this paper, we propose an effective distributed login framework for P2P networks. User …

An Efficient and Secure Weighted Threshold Signcryption Scheme

CH Tsai - Journal of Internet Technology, 2019 - jit.ndhu.edu.tw
Threshold cryptosystems are well suited for the application of group-oriented collaborations
which is of such a nature that specific cooperation should be established in connection with …