A secure privacy preserving and access control scheme for medical internet of things (MIoT) using attribute-based signcryption

RY Patil - International Journal of Information Technology, 2024 - Springer
The proliferation of medical internet of things (MIoT)-enabled medical devices and systems
has completely transformed the healthcare industry. Widespread adoption of MIoT, however …

A blockchain and proxy re-encryption based approach for IoT data security: a review

N Mahamuni, G Pattewar, H Nikam, O Loka… - … Conference on Emerging …, 2022 - Springer
Data sharing is viewed as one of the most advantageous parts in cloud computing since the
expansion of the Internet of Things. As astounding as this technology has been, data …

Digital evidence management system for cybercrime investigation using proxy re-encryption and blockchain

H Chougule, S Dhadiwal, M Lokhande… - Procedia Computer …, 2022 - Elsevier
One of the most beneficial uses of the Internet of Things in cloud is data sharing. As tempting
since this technology is, data security is still one of the issues it faces, as inappropriate data …

Proxy signature-based role delegation scheme: formal analysis and simulation

A Bannore, RY Patil, Y H. Patil… - International Journal of …, 2024 - Springer
In the security domain, wide variety of signature schemes are available for providing
confidentiality, Integrity and non-repudiation. Proxy signature schemes which are variant of …

Management of IoT devices data security using blockchain and proxy re-encryption algorithm

N Mahamuni, H Nikam, G Pattewar, O Loka… - … Conference on Emerging …, 2022 - Springer
One of the most beneficial uses of the Internet of Things in cloud is data sharing. As tempting
since this technology is, data security is still one of the issues it faces, as inappropriate data …