A secure privacy preserving and access control scheme for medical internet of things (MIoT) using attribute-based signcryption
RY Patil - International Journal of Information Technology, 2024 - Springer
The proliferation of medical internet of things (MIoT)-enabled medical devices and systems
has completely transformed the healthcare industry. Widespread adoption of MIoT, however …
has completely transformed the healthcare industry. Widespread adoption of MIoT, however …
A blockchain and proxy re-encryption based approach for IoT data security: a review
N Mahamuni, G Pattewar, H Nikam, O Loka… - … Conference on Emerging …, 2022 - Springer
Data sharing is viewed as one of the most advantageous parts in cloud computing since the
expansion of the Internet of Things. As astounding as this technology has been, data …
expansion of the Internet of Things. As astounding as this technology has been, data …
Digital evidence management system for cybercrime investigation using proxy re-encryption and blockchain
H Chougule, S Dhadiwal, M Lokhande… - Procedia Computer …, 2022 - Elsevier
One of the most beneficial uses of the Internet of Things in cloud is data sharing. As tempting
since this technology is, data security is still one of the issues it faces, as inappropriate data …
since this technology is, data security is still one of the issues it faces, as inappropriate data …
A signcryption with identity-based authentication for secure EHR sharing in IoMT utilizing ECC
Due to real-time data sharing in the Internet of Medical Things (IoMT), the healthcare sector
has evolved significantly in recent years. However, security breaches reveal incorrect …
has evolved significantly in recent years. However, security breaches reveal incorrect …
Enhancing Security in Smart Renewable Energy Grids Through Proxy Signcryption Approach
The rapid development of smart renewable energy grids (SREGs) has resulted in a vast
amount of data that requires efficient access control and secure mechanisms for sharing …
amount of data that requires efficient access control and secure mechanisms for sharing …
Proxy signature-based role delegation scheme: formal analysis and simulation
In the security domain, wide variety of signature schemes are available for providing
confidentiality, Integrity and non-repudiation. Proxy signature schemes which are variant of …
confidentiality, Integrity and non-repudiation. Proxy signature schemes which are variant of …
Management of IoT devices data security using blockchain and proxy re-encryption algorithm
N Mahamuni, H Nikam, G Pattewar, O Loka… - … Conference on Emerging …, 2022 - Springer
One of the most beneficial uses of the Internet of Things in cloud is data sharing. As tempting
since this technology is, data security is still one of the issues it faces, as inappropriate data …
since this technology is, data security is still one of the issues it faces, as inappropriate data …