Using identity‐based cryptography as a foundation for an effective and secure cloud model for e‐health
Nowadays, one of the most popular applications is cloud computing for storing data and
information through World Wide Web. Since cloud computing has become available, users …
information through World Wide Web. Since cloud computing has become available, users …
Implementation of new message encryption using elliptic curve cryptography over finite fields
Elliptic curve cryptography (ECC) is public-key cryptography that is increasingly used today
because it provides better security. In this study, we propose a new message encryption …
because it provides better security. In this study, we propose a new message encryption …
A novel identity-based privacy-preserving anonymous authentication scheme for vehicle-to-vehicle communication
This paper proposes a novel bilinear pairing-free identity-based privacy-preserving
anonymous authentication scheme for vehicle-to-vehicle (V2V) communication, called …
anonymous authentication scheme for vehicle-to-vehicle (V2V) communication, called …
Elliptic curve cryptography for security in connected vehicles
The concept of a connected vehicle refers to the linking of vehicles to each other and to
other things. Today, developments in the Internet of Things (IoT) and 5G have made a …
other things. Today, developments in the Internet of Things (IoT) and 5G have made a …
BLOCKBOX: Blockchain based black box designing and modeling
With the development of technology, data has become more accessible. The storage of
critical and valuable information is getting harder and harder with the increase of cyber …
critical and valuable information is getting harder and harder with the increase of cyber …
A lightweight identity-based authentication scheme using elliptic curve cryptography for resource-constrained IoT devices
Internet of Things (IoT) technology is increasing in popularity with its use in applications
such as smart grids, smart cities, smart homes, smart transportation systems (ITS), and e …
such as smart grids, smart cities, smart homes, smart transportation systems (ITS), and e …
Genetik Algoritma ile Genişbant Anten Tasarımı Wideband Array Design with Genetic Algorithm
MÖ Dikdere, Y Genc, NA Korkmaz… - 2023 8th …, 2023 - ieeexplore.ieee.org
The importance of big data transfer and higher speed communication is increasing day by
day in communication systems. Antennas are key objects in wireless communication …
day in communication systems. Antennas are key objects in wireless communication …
The Use of Encryption to Preserve the Privacy and Security of Electronic Health Records
NS Naz - 2023 International Conference on Business Analytics …, 2023 - ieeexplore.ieee.org
Cloud computing is the storage of data over the Internet rather than locally on a user's
device, and it is one of the most extensively used applications of computers and related …
device, and it is one of the most extensively used applications of computers and related …
[PDF][PDF] A Finger Vein Pattern Based Key Generation Exchange And Security Framework For Iot Using Id Based Cryptography, Ecdh And Aes
DP Wagh, N Srtmu, HS Fadewar, SP Shrikhande - academia.edu
Every person has a unique finger vein pattern existing within each finger. Unlike facial
features or fingerprints, finger vein authentication systems aren't vulnerable to forgery …
features or fingerprints, finger vein authentication systems aren't vulnerable to forgery …