Digital certificate verification scheme for smart grid using fog computing (Fonica)
Smart Grid (SG) infrastructure is an energy network connected with computer networks for
communication over the internet and intranets. The revolution of SGs has also introduced …
communication over the internet and intranets. The revolution of SGs has also introduced …
TwinPeaks: An approach for certificateless public key distribution for the internet and internet of things
The current public key infrastructure (PKI) has thorny issues like the overhead of certificate
revocations and the consequence of fraudulent certificates. To address such issues, we …
revocations and the consequence of fraudulent certificates. To address such issues, we …
A two‐layer attack‐robust protocol for IoT healthcare security: Two‐stage identification‐authentication protocol for IoT
The majority of studies in the field of develo** identification and authentication protocols
for Internet of Things (IoT) used cryptographic algorithms. Using brain signals is also a …
for Internet of Things (IoT) used cryptographic algorithms. Using brain signals is also a …
[HTML][HTML] A patient identification and authentication protocol to increase security
Today, with the ever-expanding IoT, information technology has led the physical world to
interact more with stimuli, sensors, and devices. The result of this interaction is …
interact more with stimuli, sensors, and devices. The result of this interaction is …
A New Certificateless Public Key Distribution and Lightweight Secure Communication
조은상 - 2017 - s-space.snu.ac.kr
thus TwinPeaks can mitigate spoofing attacks systematically. TwinPeaks needs public key
servers, which constitute a hierarchical tree like Domain Name System (DNS). For each …
servers, which constitute a hierarchical tree like Domain Name System (DNS). For each …
[CITAZIONE][C] SECURE WIRELESS SENSOR DATA TRANSMISSION AND STORAGE WITH NOVEL MODIFIED DH-ECC ALGORITHM
PLK Reddy, BRB Reddy, SR Krishna