A dynamic secure group sharing framework in public cloud computing

K Xue, P Hong - IEEE Transactions on Cloud Computing, 2014 - ieeexplore.ieee.org
With the popularity of group data sharing in public cloud computing, the privacy and security
of group sharing data have become two major issues. The cloud provider cannot be treated …

A proxy signature-based swarm drone authentication with leader selection in 5G networks

MA Abdel-Malek, K Akkaya, A Bhuyan… - IEEE Access, 2022 - ieeexplore.ieee.org
Drones are imperative for the 5G architecture as a mobile source to expand network
coverage and support seamless services, particularly through enabling device-to-device …

Multilevel Subgranting by Power of Attorney and OAuth Authorization Server in Cyber–Physical Systems

SV Sudarsan, O Schelén… - IEEE Internet of Things …, 2023 - ieeexplore.ieee.org
Many cyber–physical systems (CPSs) are today semi-autonomous and powerful enough to
perform advanced tasks on their own. This means they can also act as representatives of …

A proxy signature-based drone authentication in 5G D2D networks

MA Abdel-Malek, K Akkaya, A Bhuyan… - 2021 IEEE 93rd …, 2021 - ieeexplore.ieee.org
5G is the beginning of a new era in cellular communication, bringing up a highly connected
network with the incorporation of the Internet of Things (IoT). To flexibly operate all the IoT …

Certificateless multi-proxy signature

Z **, Q Wen - Computer Communications, 2011 - Elsevier
Multi-proxy signature is a scheme that an original signer authorizes a proxy group as his
proxy agent and later only the cooperation of all proxy signers in the proxy group could sign …

[BUCH][B] Introduction to cryptography

S Padhye, RA Sahu, V Saraswat - 2018 - taylorfrancis.com
Electronic communication and financial transactions have assumed massive proportions
today. But they come with high risks. Achieving cyber security has become a top priority, and …

[HTML][HTML] A novel proxy signature scheme based on user hierarchical access control policy

AK Das, A Massand, S Patil - Journal of King Saud University-Computer …, 2013 - Elsevier
In this paper, we propose a new security protocol for proxy signature by a hierarchy of proxy
signers. In this protocol, the original signer delegates his/her signing capability to a …

UAV-based privacy-preserved trustworthy seamless service agility for NextG cellular networks

MA Abdel-Malek, MM Sayed, M Azab - Sensors, 2022 - mdpi.com
Next Generation cellular networks are expected to offer better service quality, secure and
reliable service provisioning, and more cooperative operation even in unexpected stressful …

A batch verification for multiple proxy signature

SF Tzeng, CC Lee, MS Hwang - Parallel Processing Letters, 2011 - World Scientific
In this article, we proposed a batch verification scheme for multiple proxy signatures to
reduce the proxy signature verification time. The proposed scheme is not only efficient …

Efficient authentication of drones to mmWave wireless mesh networks in post-disaster scenarios

MA Abdel-Malek, K Akkaya, N Saputro… - … 2020-2020 IEEE …, 2020 - ieeexplore.ieee.org
Unmanned Aerial Vehicles (UAVs), or drones, are increasingly being utilized for public
safety circumstances including post-disaster recovery of destroyed communication …