[HTML][HTML] Cybersecurity challenges in vehicular communications

Z El-Rewini, K Sadatsharan, DF Selvaraj… - Vehicular …, 2020 - Elsevier
As modern vehicles are capable to connect to an external infrastructure and Vehicle-to-
Everything (V2X) communication technologies mature, the necessity to secure …

A novel hybrid encryption method to secure healthcare data in IoT-enabled healthcare infrastructure

S Das, S Namasudra - Computers and Electrical Engineering, 2022 - Elsevier
Nowadays, smart devices are playing a vital role to overtake the conventional healthcare
management system. Here, the Internet of Things (IoT) leads the healthcare industry towards …

Recent advances and applications of passive harmonic RFID systems: A review

S Mondal, D Kumar, P Chahal - Micromachines, 2021 - mdpi.com
Harmonic Radio Frequency Identification (RFID) systems have attracted significant interest
over the last decade as it provides many benefits over the conventional RFID systems …

ECCbAS: An ECC based authentication scheme for healthcare IoT systems

MR Servati, M Safkhani - Pervasive and Mobile Computing, 2023 - Elsevier
Smart technology is a concept for efficiently managing smart things such as vehicles,
buildings, home appliances, healthcare systems and others, through the use of networks …

MACPABE: Multi‐Authority‐based CP‐ABE with efficient attribute revocation for IoT‐enabled healthcare infrastructure

S Das, S Namasudra - International journal of network …, 2023 - Wiley Online Library
Abstract The Internet of Things (IoT) technology along with cloud computing has gained
much attention in recent years for its potential to upgrade conventional healthcare systems …

[PDF][PDF] Performance analysis of RSA and elliptic curve cryptography.

D Mahto, DK Yadav - Int. J. Netw. Secur., 2018 - ijns.jalaxy.com.tw
This paper presents a performance study and analysis of two popular public-key
cryptosystems: RSA with its two variants, and ECC (Elliptic Curve Cryptography). RSA is …

Towards secure authenticating of cache in the reader for RFID-based IoT systems

CT Li, CC Lee, CY Weng, CM Chen - Peer-to-Peer Networking and …, 2018 - Springer
The use of radio frequency identification (RFID) in Internet of things (IoT) has led to a
significant progress in numerous intelligent devices. However, due to its restrictions on …

Analysis of elliptic curve cryptography & RSA

MR Khan, K Upreti, MI Alam, H Khan… - Journal of ICT …, 2023 - ieeexplore.ieee.org
In today's digital world, the Internet is an essential component of communication networks. It
provides a platform for quickly exchanging information among communicating parties. There …

SDRLAP: A secure lightweight RFID mutual authentication protocol based on PUF with strong desynchronization resistance

T Li, Y Liu, J Ning - Peer-to-Peer Networking and Applications, 2023 - Springer
As one of the key identity authentication technologies in the Internet of Things (IoT), Radio
Frequency Identification (RFID) technology has been widely adopted in various wireless …

RFID authentication scheme based on hyperelliptic curve signcryption

U Ali, MYIB Idris, MNB Ayub, I Ullah, I Ali… - IEEE …, 2021 - ieeexplore.ieee.org
The implementation of efficient security mechanisms for Radio Frequency Identification
(RFID) system has always been a continuous challenge due to its limited computing …