[HTML][HTML] Smart contract-based security architecture for collaborative services in municipal smart cities

S Siddiqui, S Hameed, SA Shah, AK Khan… - Journal of Systems …, 2023 - Elsevier
Abstract The Internet of Things (IoT) can provide intelligent and effective solutions to various
applications with higher accuracy that requires less or no human intervention. Smart Cities …

Cost-effective scalable and anonymous certificateless remote authentication protocol

H Xiong - IEEE Transactions on Information Forensics and …, 2014 - ieeexplore.ieee.org
Existing anonymous remote authentication protocols to secure wireless body area networks
(WBANs) raise challenges such as eliminating the need for distributing clients' account …

Lightweight authentication and matrix-based key agreement scheme for healthcare in fog computing

J Shen, H Yang, A Wang, T Zhou, C Wang - Peer-to-Peer Networking and …, 2019 - Springer
Healthcare in fog computing is a novel topic in recent year. With the development of
technology, it is a pressing issue to accomplish the secure healthcare in fog computing …

Security in building automation systems

W Granzer, F Praus, W Kastner - IEEE Transactions on …, 2009 - ieeexplore.ieee.org
Building automation systems are traditionally concerned with the control of heating,
ventilation, and air conditioning, as well as lighting and shading, systems. They have their …

High-speed hardware implementations of elliptic curve cryptography: A survey

GM De Dormale, JJ Quisquater - Journal of systems architecture, 2007 - Elsevier
For the last decade, Elliptic Curve Cryptography (ECC) has gained increasing acceptance in
the industry and the academic community and has been the subject of several standards …

Implementation of text based cryptosystem using elliptic curve cryptography

SMC Vigila, K Muneeswaran - 2009 First international …, 2009 - ieeexplore.ieee.org
Data encryption is widely used to ensure security in open networks such as the internet. With
the fast development of cryptography research and computer technology, the capabilities of …

Access control in user hierarchy based on elliptic curve cryptosystem

YF Chung, HH Lee, F Lai, TS Chen - Information Sciences, 2008 - Elsevier
This work proposes a novel key management method based on elliptic curve cryptosystem
and one-way hash function to solve dynamic access problems in a user hierarchy. The …

LPPSA: An efficient lightweight privacy-preserving signature-based authentication protocol for a vehicular ad hoc network

KA Yadav, P Vijayakumar - Annals of Telecommunications, 2022 - Springer
The rapid expansion in research has led to vast interest in intelligent transport systems
(ITSs), especially vehicular ad hoc networks (VANETs), which include communication …

A new hybrid chaotic map and its application on image encryption and hiding

Y Cao - Mathematical Problems in Engineering, 2013 - Wiley Online Library
A new hybrid chaotic map is constructed in this paper and applied to image encryption and
hiding. MD5 is used as part of initial condition and control parameter to perturb the trajectory …

DEVS-C++: a high performance modelling and simulation environment

BP Zeigler, Y Moon, D Kim… - Proceedings of HICSS-29 …, 1996 - ieeexplore.ieee.org
Simulation of landscape ecosystems with high realism demands computing power greatly
exceeding that of curent workstation technology. However, the prospects are excellent that …