A review on lightweight cryptography for Internet-of-Things based applications
Abstract The Internet-of-Things (IoT) is a combination of an intelligent infrastructure
combined with various self-organizing devices. These devices are used to monitor the …
combined with various self-organizing devices. These devices are used to monitor the …
An efficient and provably secure certificateless key-encapsulated signcryption scheme for flying ad-hoc network
A Flying Ad-hoc Network (FANET) consists of Unmanned Aerial Vehicles (UAVs) tasked to
handle the communication jobs in a multi-hop ad-hoc fashion. Unlike its predecessors, ie …
handle the communication jobs in a multi-hop ad-hoc fashion. Unlike its predecessors, ie …
A lightweight and provable secure identity-based generalized proxy signcryption (IBGPS) scheme for Industrial Internet of Things (IIoT)
Abstract Recently, the Industrial Internet of Things (IIoT) has become increasingly important
for applications in the industry. IIoT has essentially become a prime security focus for …
for applications in the industry. IIoT has essentially become a prime security focus for …
An efficient and provable secure certificate-based combined signature, encryption and signcryption scheme for internet of things (IoT) in mobile health (M-health) …
Mobile health (M-Health) system is the remote form of Wireless Body Area Networks
(WBAN), which can be used for collecting patient's health data in real-time with mobile …
(WBAN), which can be used for collecting patient's health data in real-time with mobile …
A lightweight and formally secure certificate based signcryption with proxy re-encryption (CBSRE) for Internet of Things enabled smart grid
A smart grid is a new ecosystem, which is made by combining a number of smart Internet of
Things (IoT) devices that manage wide energy sources by increasing the efficiency and …
Things (IoT) devices that manage wide energy sources by increasing the efficiency and …
Efficient and provably secure multireceiver signcryption scheme for multicast communication in edge computing
With the popularity of edge computing, edge nodes are connected with the Internet of Things
(IoT) devices to process and analyze IoT-created data, and feedback corresponding results …
(IoT) devices to process and analyze IoT-created data, and feedback corresponding results …
Multiaccess Edge Computing Empowered Flying Ad Hoc Networks with Secure Deployment Using Identity‐Based Generalized Signcryption
A group of small UAVs can synergize to form a flying ad hoc network (FANET). The small
UAVs are, typically, prone to security lapses because of limited onboard power, restricted …
UAVs are, typically, prone to security lapses because of limited onboard power, restricted …
Certificateless Proxy Reencryption Scheme (CPRES) Based on Hyperelliptic Curve for Access Control in Content‐Centric Network (CCN)
Information‐centric networking is the developing model envisioned by an increasing body of
the data communication research community, which shifts the current network paradigm …
the data communication research community, which shifts the current network paradigm …
A lightweight and provable secured certificateless signcryption approach for crowdsourced IIoT applications
Industrial Internet of Things (IIoT) is a new type of Internet of Things (IoT), which enables
sensors to merge with several smart devices to monitor machine status, environment, and …
sensors to merge with several smart devices to monitor machine status, environment, and …
Efficient and anonymous certificateless multi-message and multi-receiver signcryption scheme based on ECC
L Pang, M Wei, H Li - IEEE Access, 2019 - ieeexplore.ieee.org
As the further extension of the multi-receiver signcryption, the multi-message and multi-
receiver signcryption allows a sender to simultaneously signcrypt different messages for …
receiver signcryption allows a sender to simultaneously signcrypt different messages for …