Elliptic Curve Cryptography; Applications, challenges, recent advances, and future trends: A comprehensive survey

S Ullah, J Zheng, N Din, MT Hussain, F Ullah… - Computer Science …, 2023 - Elsevier
Elliptic Curve (EC) is the most recent and advanced technique of Elliptic Curve
Cryptography (ECC). EC is often used to improve the security of open communication …

[HTML][HTML] Secure authentication and privacy-preserving techniques in Vehicular Ad-hoc NETworks (VANETs)

D Manivannan, SS Moni, S Zeadally - Vehicular Communications, 2020 - Elsevier
In the last decade, there has been growing interest in Vehicular Ad Hoc NETworks
(VANETs). Today car manufacturers have already started to equip vehicles with …

A security and privacy review of VANETs

F Qu, Z Wu, FY Wang, W Cho - IEEE Transactions on Intelligent …, 2015 - ieeexplore.ieee.org
Vehicular ad hoc networks (VANETs) have stimulated interest in both academic and industry
settings because, once deployed, they would bring a new driving experience to drivers …

Provably secure authenticated key agreement scheme for smart grid

V Odelu, AK Das, M Wazid… - IEEE Transactions on …, 2016 - ieeexplore.ieee.org
Due to the rapid development of wireless communication systems, authentication becomes
a key security component in smart grid environments. Authentication then plays an important …

Secure-enhanced federated learning for AI-empowered electric vehicle energy prediction

W Wang, FH Memon, Z Lian, Z Yin… - IEEE Consumer …, 2021 - ieeexplore.ieee.org
Although AI-empowered schemes bring some sound solutions to stimulate more reasonable
energy distribution schemes between charging stations (CSs) and CS providers, frequent …

Secure anonymous key distribution scheme for smart grid

JL Tsai, NW Lo - IEEE transactions on smart grid, 2015 - ieeexplore.ieee.org
To fully support information management among various stakeholders in smart grid
domains, how to establish secure communication sessions has become an important issue …

Achieving secure role-based access control on encrypted data in cloud storage

L Zhou, V Varadharajan… - IEEE transactions on …, 2013 - ieeexplore.ieee.org
With the rapid developments occurring in cloud computing and services, there has been a
growing trend to use the cloud for large-scale data storage. This has raised the important …

[HTML][HTML] A comprehensive survey on security and privacy for electronic health data

SR Oh, YD Seo, E Lee, YG Kim - International Journal of Environmental …, 2021 - mdpi.com
Recently, the integration of state-of-the-art technologies, such as modern sensors, networks,
and cloud computing, has revolutionized the conventional healthcare system. However …

GSIS: A secure and privacy-preserving protocol for vehicular communications

X Lin, X Sun, PH Ho, X Shen - IEEE Transactions on vehicular …, 2007 - ieeexplore.ieee.org
In this paper, we first identify some unique design requirements in the aspects of security
and privacy preservation for communications between different communication devices in …

Proposing a secure RPL based internet of things routing protocol: a review

ZA Almusaylim, A Alhumam, NZ Jhanjhi - Ad Hoc Networks, 2020 - Elsevier
Abstract Nowadays, the Internet of Things (IoT) research domain attracts the researchers,
due to its extensive collection of applications and ease in deploying in several domains of …