Digital certificate verification scheme for smart grid using fog computing (Fonica)

S Mahmood, M Gohar, JG Choi, SJ Koh, H Alquhayz… - Sustainability, 2021 - mdpi.com
Smart Grid (SG) infrastructure is an energy network connected with computer networks for
communication over the internet and intranets. The revolution of SGs has also introduced …

TwinPeaks: An approach for certificateless public key distribution for the internet and internet of things

E Cho, J Kim, M Park, H Lee, C Hamm, S Park… - Computer Networks, 2020 - Elsevier
The current public key infrastructure (PKI) has thorny issues like the overhead of certificate
revocations and the consequence of fraudulent certificates. To address such issues, we …

A two‐layer attack‐robust protocol for IoT healthcare security: Two‐stage identification‐authentication protocol for IoT

S Afsaneh, A Sepideh, M Ali, AM Salah - IET Communications, 2021 - Wiley Online Library
The majority of studies in the field of develo** identification and authentication protocols
for Internet of Things (IoT) used cryptographic algorithms. Using brain signals is also a …

[HTML][HTML] A patient identification and authentication protocol to increase security

A Sharafi, S Adabi, A Movaghar… - Nashriyyah-i Muhandisi-i …, 2022 - jour.aicti.ir
Today, with the ever-expanding IoT, information technology has led the physical world to
interact more with stimuli, sensors, and devices. The result of this interaction is …

A New Certificateless Public Key Distribution and Lightweight Secure Communication

조은상 - 2017 - s-space.snu.ac.kr
thus TwinPeaks can mitigate spoofing attacks systematically. TwinPeaks needs public key
servers, which constitute a hierarchical tree like Domain Name System (DNS). For each …

[CITAZIONE][C] SECURE WIRELESS SENSOR DATA TRANSMISSION AND STORAGE WITH NOVEL MODIFIED DH-ECC ALGORITHM

PLK Reddy, BRB Reddy, SR Krishna