A secure privacy preserving and access control scheme for medical internet of things (MIoT) using attribute-based signcryption

RY Patil - International Journal of Information Technology, 2024 - Springer
The proliferation of medical internet of things (MIoT)-enabled medical devices and systems
has completely transformed the healthcare industry. Widespread adoption of MIoT, however …

A blockchain and proxy re-encryption based approach for IoT data security: a review

N Mahamuni, G Pattewar, H Nikam, O Loka… - … Conference on Emerging …, 2022 - Springer
Data sharing is viewed as one of the most advantageous parts in cloud computing since the
expansion of the Internet of Things. As astounding as this technology has been, data …

Digital evidence management system for cybercrime investigation using proxy re-encryption and blockchain

H Chougule, S Dhadiwal, M Lokhande… - Procedia Computer …, 2022 - Elsevier
One of the most beneficial uses of the Internet of Things in cloud is data sharing. As tempting
since this technology is, data security is still one of the issues it faces, as inappropriate data …

A signcryption with identity-based authentication for secure EHR sharing in IoMT utilizing ECC

RY Patil, A Karati, YH Patil - International Journal of Information …, 2024 - Springer
Due to real-time data sharing in the Internet of Medical Things (IoMT), the healthcare sector
has evolved significantly in recent years. However, security breaches reveal incorrect …

Enhancing Security in Smart Renewable Energy Grids Through Proxy Signcryption Approach

RY Patil, YH Patil, M Louzazni, RB Patil… - Journal of …, 2024 - Wiley Online Library
The rapid development of smart renewable energy grids (SREGs) has resulted in a vast
amount of data that requires efficient access control and secure mechanisms for sharing …

Proxy signature-based role delegation scheme: formal analysis and simulation

A Bannore, RY Patil, Y H. Patil… - International Journal of …, 2024 - Springer
In the security domain, wide variety of signature schemes are available for providing
confidentiality, Integrity and non-repudiation. Proxy signature schemes which are variant of …

Management of IoT devices data security using blockchain and proxy re-encryption algorithm

N Mahamuni, H Nikam, G Pattewar, O Loka… - … Conference on Emerging …, 2022 - Springer
One of the most beneficial uses of the Internet of Things in cloud is data sharing. As tempting
since this technology is, data security is still one of the issues it faces, as inappropriate data …

[PDF][PDF] Jestr r

RV Patil, YH Patil, A Bannore - Journal of Engineering Science and …, 2023 - jestr.org
The deadliest accident ratio for cars and trucks on highways occurs when vehicles are
running underneath trucks, causing serious and even fatal injuries to the occupants of the …