BFIM: Performance measurement of a blockchain based hierarchical tree layered fog-IoT microservice architecture
Fog computing complements cloud computing by removing several limitations, such as
delays and network bandwidth. It emerged to support Internet of Things (IoT) applications …
delays and network bandwidth. It emerged to support Internet of Things (IoT) applications …
An active-routing authentication scheme in MANET
J Tu, D Tian, Y Wang - IEEE Access, 2021 - ieeexplore.ieee.org
Mobile ad-hoc networks (MANET) is a network mode that does not depend on network
infrastructure and central access. The fast and flexible networking mode of MANET renders …
infrastructure and central access. The fast and flexible networking mode of MANET renders …
An identity-based encryption scheme for data security in fog computing
Fog computing provides better integration facilities between cloud computing and Internet of
things with real-time interactions. It delivers faster computing functionalities sitting close to …
things with real-time interactions. It delivers faster computing functionalities sitting close to …
[PDF][PDF] A survey on security challenges in the current MANET routing protocols
FC Korir, W Cheruiyot - Global Journal of Engineering and …, 2022 - academia.edu
Wireless communication employs radio technology to facilitate data transmission without
any fixed infrastructures. A mobile ad hoc network is an example of this data transmission …
any fixed infrastructures. A mobile ad hoc network is an example of this data transmission …
Buvots: A blockchain based unmanipulated voting scheme
The electronic voting system is introduced in most countries to prevent vote tampering. The
infrastructure of the current voting system is not transparent and it can easily be manipulated …
infrastructure of the current voting system is not transparent and it can easily be manipulated …
AUASF: An anonymous users authentication scheme for fog-IoT environment
Authentication is a challenging and emerging issue for Fog-IoT security paradigms. The fog
nodes toward large-scale end-users offer various interacted IoT services. The authentication …
nodes toward large-scale end-users offer various interacted IoT services. The authentication …
Secured e-payment system based on automated authentication data and iterated salted hash algorithm
Electronic payment has been considered as one of the most significant and convenient
applications of modern electronic services e-University compared to traditional methods that …
applications of modern electronic services e-University compared to traditional methods that …
HIBAF: A data security scheme for fog computing
Fog computing complemented cloud computing integration services in the Internet of Things
(IoT) and the web of real-time interactivity. Fog offers faster computing and other services …
(IoT) and the web of real-time interactivity. Fog offers faster computing and other services …
Understanding optimizations and measuring performances of PBKDF2
AF Iuorio, A Visconti - 2nd International Conference on Wireless Intelligent …, 2019 - Springer
Password-based key derivation functions (KDFs) are used to generate secure keys of
arbitrary length implemented in many security-related systems. The strength of these KDFs …
arbitrary length implemented in many security-related systems. The strength of these KDFs …
Implementation of security features in MANETs using SHA-3 standard algorithm
In Secure Hash Algorithm-3 standards, the functions are based on instance of the KECCAK
algorithm. In this paper, we have implemented Secured Hash Algorithm (SHA3-256) for …
algorithm. In this paper, we have implemented Secured Hash Algorithm (SHA3-256) for …