[HTML][HTML] Cybersecurity challenges in vehicular communications
Z El-Rewini, K Sadatsharan, DF Selvaraj… - Vehicular …, 2020 - Elsevier
As modern vehicles are capable to connect to an external infrastructure and Vehicle-to-
Everything (V2X) communication technologies mature, the necessity to secure …
Everything (V2X) communication technologies mature, the necessity to secure …
A novel hybrid encryption method to secure healthcare data in IoT-enabled healthcare infrastructure
Nowadays, smart devices are playing a vital role to overtake the conventional healthcare
management system. Here, the Internet of Things (IoT) leads the healthcare industry towards …
management system. Here, the Internet of Things (IoT) leads the healthcare industry towards …
Recent advances and applications of passive harmonic RFID systems: A review
Harmonic Radio Frequency Identification (RFID) systems have attracted significant interest
over the last decade as it provides many benefits over the conventional RFID systems …
over the last decade as it provides many benefits over the conventional RFID systems …
ECCbAS: An ECC based authentication scheme for healthcare IoT systems
Smart technology is a concept for efficiently managing smart things such as vehicles,
buildings, home appliances, healthcare systems and others, through the use of networks …
buildings, home appliances, healthcare systems and others, through the use of networks …
MACPABE: Multi‐Authority‐based CP‐ABE with efficient attribute revocation for IoT‐enabled healthcare infrastructure
Abstract The Internet of Things (IoT) technology along with cloud computing has gained
much attention in recent years for its potential to upgrade conventional healthcare systems …
much attention in recent years for its potential to upgrade conventional healthcare systems …
[PDF][PDF] Performance analysis of RSA and elliptic curve cryptography.
This paper presents a performance study and analysis of two popular public-key
cryptosystems: RSA with its two variants, and ECC (Elliptic Curve Cryptography). RSA is …
cryptosystems: RSA with its two variants, and ECC (Elliptic Curve Cryptography). RSA is …
Towards secure authenticating of cache in the reader for RFID-based IoT systems
The use of radio frequency identification (RFID) in Internet of things (IoT) has led to a
significant progress in numerous intelligent devices. However, due to its restrictions on …
significant progress in numerous intelligent devices. However, due to its restrictions on …
Analysis of elliptic curve cryptography & RSA
In today's digital world, the Internet is an essential component of communication networks. It
provides a platform for quickly exchanging information among communicating parties. There …
provides a platform for quickly exchanging information among communicating parties. There …
SDRLAP: A secure lightweight RFID mutual authentication protocol based on PUF with strong desynchronization resistance
T Li, Y Liu, J Ning - Peer-to-Peer Networking and Applications, 2023 - Springer
As one of the key identity authentication technologies in the Internet of Things (IoT), Radio
Frequency Identification (RFID) technology has been widely adopted in various wireless …
Frequency Identification (RFID) technology has been widely adopted in various wireless …
RFID authentication scheme based on hyperelliptic curve signcryption
The implementation of efficient security mechanisms for Radio Frequency Identification
(RFID) system has always been a continuous challenge due to its limited computing …
(RFID) system has always been a continuous challenge due to its limited computing …