RGB image encryption based on symmetric keys using Arnold transform, 3D chaotic map and affine hill cipher
In this work, we propose a novel color image encryption scheme based on symmetric keys
using the synergistic approach of Arnold transform, 3D logistic chaotic map with XOR …
using the synergistic approach of Arnold transform, 3D logistic chaotic map with XOR …
Digital image encryption using elliptic curve cryptography: A review
Today, digital images are used in many different applications. They can be social media
applications or critical applications such as military and medical. However, cyber attacks or …
applications or critical applications such as military and medical. However, cyber attacks or …
ELCPAS: A new efficient lightweight certificateless conditional privacy preserving authentication scheme for IoV
This paper proposes a new efficient certificateless conditional privacy preserving
authentication (CL-CPPA) scheme named ELCPAS, which is pairing-free, energy-efficient …
authentication (CL-CPPA) scheme named ELCPAS, which is pairing-free, energy-efficient …
A heterogeneous online/offline signcryption scheme for Internet of Vehicles
Z Chen, C Jin, G Chen, Y Jin, H Zong - Vehicular Communications, 2023 - Elsevier
With the rapid development of wireless communication and autonomous driving
technologies, the Internet of Vehicles (IoV) technology has emerged to build a large network …
technologies, the Internet of Vehicles (IoV) technology has emerged to build a large network …
TEXCEL: text encryption with elliptic curve cryptography for enhanced security
Elliptic curve cryptography has emerged as a potent tool for safeguarding data
communications. This research paper addresses the problem of traditional text encryption …
communications. This research paper addresses the problem of traditional text encryption …
A heterogeneous signcryption scheme with Cryptographic Reverse Firewalls for IoT and its application
N Eltayieb, R Elhabob, Y Liao, F Li, S Zhou - Journal of Information Security …, 2024 - Elsevier
The Snowden leaks exposed the truth that skilled attackers can access users' devices and
steal their private information. Although public key encryption is widely used and …
steal their private information. Although public key encryption is widely used and …
A novel identity-based privacy-preserving anonymous authentication scheme for vehicle-to-vehicle communication
This paper proposes a novel bilinear pairing-free identity-based privacy-preserving
anonymous authentication scheme for vehicle-to-vehicle (V2V) communication, called …
anonymous authentication scheme for vehicle-to-vehicle (V2V) communication, called …
Elliptic curve cryptography for security in connected vehicles
The concept of a connected vehicle refers to the linking of vehicles to each other and to
other things. Today, developments in the Internet of Things (IoT) and 5G have made a …
other things. Today, developments in the Internet of Things (IoT) and 5G have made a …
A Blockchain‐Based Proxy Re‐Encryption Scheme With Cryptographic Reverse Firewall for IoV
C Jin, Z Chen, W Qin, K Sun, G Chen… - International Journal of …, 2024 - Wiley Online Library
As the internet of vehicles (IoV) technology develops, it promotes the intelligent interaction
among vehicles, roadside units, and the environment. Nevertheless, it also brings vehicle …
among vehicles, roadside units, and the environment. Nevertheless, it also brings vehicle …
A lightweight identity-based authentication scheme using elliptic curve cryptography for resource-constrained IoT devices
Internet of Things (IoT) technology is increasing in popularity with its use in applications
such as smart grids, smart cities, smart homes, smart transportation systems (ITS), and e …
such as smart grids, smart cities, smart homes, smart transportation systems (ITS), and e …