A secure privacy preserving and access control scheme for medical internet of things (MIoT) using attribute-based signcryption

RY Patil - International Journal of Information Technology, 2024 - Springer
The proliferation of medical internet of things (MIoT)-enabled medical devices and systems
has completely transformed the healthcare industry. Widespread adoption of MIoT, however …

Ensuring accountability in digital forensics with proxy re-encryption based chain of custody

RY Patil, YH Patil, A Bannore, M Ranjanikar - International Journal of …, 2024 - Springer
In the realm of digital forensics, the establishment of robust standards for maintaining the
integrity of digital evidence is of paramount importance. Addressing this concern, this study …

MTFP: matrix-based task-fog pairing method for task scheduling in fog computing

N Kaur, A Mittal - International Journal of Information Technology, 2024 - Springer
In the present era of seamless connectivity which demands enormous smart devices to be
allied and send data to the cloud, it seems imperative to organize and process cloud-based …

An elliptic curve-based lightweight mutual authentication scheme for secure communication in smart grids

FM Salem, R Khairy, IA Ali - International Journal of Information …, 2024 - Springer
The energy balance between consumers and the smart grid is preserved using data
transferred from the smart grids' devices to either the utility centers or the remote-control …

Transactive energy management system for smart grids using Multi-Agent Modeling and Blockchain

M Syamala, U Gowri, DV Babu, ASA Nisha… - … Informatics and Systems, 2024 - Elsevier
Technological approaches for effective energy regulation are required due to incorporating
contemporary electrical systems with sustainable power resources. Our article suggests a …

MOHBA: multi-objective honey badger algorithm for workflow scheduling in heterogeneous cloud–fog-IoT networks

P Shukla, D Agrawal, S Pandey… - International Journal of …, 2024 - Springer
Abstract Nowadays, the Internet of Things (IoT) is used for the purpose of gathering data
through sensors as well as for storing and processing data. Due to the inherent limitations in …

Proxy signature-based role delegation scheme: formal analysis and simulation

A Bannore, RY Patil, Y H. Patil… - International Journal of …, 2024 - Springer
In the security domain, wide variety of signature schemes are available for providing
confidentiality, Integrity and non-repudiation. Proxy signature schemes which are variant of …

Privacy-preserving eigenvector computation with applications in spectral clustering

M Jaberi, H Mala - International Journal of Information Technology, 2024 - Springer
Eigenvectors give many useful information about the data. One of the applications that
benefits from eigenvectors is spectral clustering in which the nodes of a graph that can be a …

A signcryption with identity-based authentication for secure EHR sharing in IoMT utilizing ECC

RY Patil, A Karati, YH Patil - International Journal of Information …, 2024 - Springer
Due to real-time data sharing in the Internet of Medical Things (IoMT), the healthcare sector
has evolved significantly in recent years. However, security breaches reveal incorrect …

TISCMB: design of a highly efficient blockchain consensus model with trust integrated self-correcting miner selection

S Ravi Kumar, M Goyal - International Journal of Information Technology, 2023 - Springer
Blockchain is rapidly becoming the de facto standard for storage applications requiring high
transparency, record traceability, immutable data, and distributed processing. Researchers …