Blockchain for large-scale internet of things data storage and protection

R Li, T Song, B Mei, H Li, X Cheng… - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
With the dramatically increasing deployment of IoT devices, storing and protecting the large
volume of IoT data has become a significant issue. Traditional cloud-based IoT structures …

[HTML][HTML] Attributes impacting cybersecurity policy development: An evidence from seven nations

A Mishra, YI Alzoubi, MJ Anwar, AQ Gill - Computers & Security, 2022 - Elsevier
Cyber threats have risen as a result of the growing usage of the Internet. Organizations must
have effective cybersecurity policies in place to respond to escalating cyber threats …

A comprehensive survey of cryptography key management systems

S Rana, FK Parast, B Kelly, Y Wang, KB Kent - Journal of Information …, 2023 - Elsevier
Cryptographic methods have been extensively employed in various systems to address
security objectives, such as data confidentiality, authentication, and secure communication …

Elliptic curve lightweight cryptography: A survey

CA Lara-Nino, A Diaz-Perez… - IEEE Access, 2018 - ieeexplore.ieee.org
Since it was invented in 1986, elliptic curve cryptography (ECC) has been studied widely in
industry and academy from different perspectives. Some of these aspects include …

Aot: Authentication and access control for the entire iot device life-cycle

ALM Neto, ALF Souza, I Cunha, M Nogueira… - Proceedings of the 14th …, 2016 - dl.acm.org
The consumer electronics industry is witnessing a surge in Internet of Things (IoT) devices,
ranging from mundane artifacts to complex biosensors connected across disparate …

[PDF][PDF] Preventing multiple accessing attacks via efficient integration of captcha crypto hash functions

N Kheshaifaty, A Gutub - Int. J. Comput. Sci. Netw. Secur.(IJCSNS), 2020 - researchgate.net
Authentication is the process of verifying the identity of online computer users. It can be
confirmed using various methods such as captchas or encrypted hashed passwords to …

A scalable attribute-based access control scheme with flexible delegation cum sharing of access privileges for cloud storage

R Ahuja, SK Mohanty - IEEE Transactions on Cloud Computing, 2017 - ieeexplore.ieee.org
Nowadays cloud servers have become the primary choice to store and share data with
multiple users across the globe. The major challenge in sharing data using cloud servers is …

An IBE-based design for assured deletion in cloud storage

A Bentajer, M Hedabou, K Abouelmehdi, Z Igarramen… - Cryptologia, 2019 - Taylor & Francis
Assured deletion of outsourced data in cloud storage is one of the most important issues in
cloud storage. The use of encryption is a promising approach to address this issue. In this …

CS-IBE: a data confidentiality system in public cloud storage system

A Bentajer, M Hedabou, K Abouelmehdi… - Procedia computer …, 2018 - Elsevier
In public cloud storage systems, the confidentiality of sensitive data remains the most
important issue. Cryptography is a promising approach for addressing this issue. In this …

Cross-layer encryption of CFB-AES-TURBO for advanced satellite data transmission security

S Jeon, J Kwak, JP Choi - IEEE Transactions on Aerospace …, 2021 - ieeexplore.ieee.org
As the advanced satellite network can provide extremely diverse data to various types of
users, it is of vital importance to achieve data security using encryption over satellite …