Using identity‐based cryptography as a foundation for an effective and secure cloud model for e‐health

S Mittal, A Bansal, D Gupta, S Juneja… - Computational …, 2022 - Wiley Online Library
Nowadays, one of the most popular applications is cloud computing for storing data and
information through World Wide Web. Since cloud computing has become available, users …

Implementation of new message encryption using elliptic curve cryptography over finite fields

Y Genç, E Afacan - 2021 International congress of advanced …, 2021 - ieeexplore.ieee.org
Elliptic curve cryptography (ECC) is public-key cryptography that is increasingly used today
because it provides better security. In this study, we propose a new message encryption …

A novel identity-based privacy-preserving anonymous authentication scheme for vehicle-to-vehicle communication

Y Genc, C Korkuc, N Aytas, E Afacan… - Elektronika ir …, 2023 - avesis.tedu.edu.tr
This paper proposes a novel bilinear pairing-free identity-based privacy-preserving
anonymous authentication scheme for vehicle-to-vehicle (V2V) communication, called …

Elliptic curve cryptography for security in connected vehicles

Y Genç, M Habek, N Aytaş, A Akkoç… - 2022 30th Signal …, 2022 - ieeexplore.ieee.org
The concept of a connected vehicle refers to the linking of vehicles to each other and to
other things. Today, developments in the Internet of Things (IoT) and 5G have made a …

BLOCKBOX: Blockchain based black box designing and modeling

C Korkuc, N Aytas Korkmaz, Y Genc… - Concurrency and …, 2024 - Wiley Online Library
With the development of technology, data has become more accessible. The storage of
critical and valuable information is getting harder and harder with the increase of cyber …

A lightweight identity-based authentication scheme using elliptic curve cryptography for resource-constrained IoT devices

Y Genc, E Afacan - … Networks for Industrial Internet of Things …, 2022 - taylorfrancis.com
Internet of Things (IoT) technology is increasing in popularity with its use in applications
such as smart grids, smart cities, smart homes, smart transportation systems (ITS), and e …

Genetik Algoritma ile Genişbant Anten Tasarımı Wideband Array Design with Genetic Algorithm

MÖ Dikdere, Y Genc, NA Korkmaz… - 2023 8th …, 2023 - ieeexplore.ieee.org
The importance of big data transfer and higher speed communication is increasing day by
day in communication systems. Antennas are key objects in wireless communication …

The Use of Encryption to Preserve the Privacy and Security of Electronic Health Records

NS Naz - 2023 International Conference on Business Analytics …, 2023 - ieeexplore.ieee.org
Cloud computing is the storage of data over the Internet rather than locally on a user's
device, and it is one of the most extensively used applications of computers and related …

[PDF][PDF] A Finger Vein Pattern Based Key Generation Exchange And Security Framework For Iot Using Id Based Cryptography, Ecdh And Aes

DP Wagh, N Srtmu, HS Fadewar, SP Shrikhande - academia.edu
Every person has a unique finger vein pattern existing within each finger. Unlike facial
features or fingerprints, finger vein authentication systems aren't vulnerable to forgery …