[HTML][HTML] A systematic literature review of attribute based encryption in health services

R Imam, K Kumar, SM Raza, R Sadaf, F Anwer… - Journal of King Saud …, 2022 - Elsevier
The widespread adoption of cloud technology in the healthcare industry has achieved
effective outcomes in sharing health records and sensitive data. In recent years, many …

[PDF][PDF] Logistic Regression with Elliptical Curve Cryptography to Establish Secure IoT.

JR Arunkumar, S Velmurugan… - … Systems Science & …, 2023 - cdn.techscience.cn
Nowadays, Wireless Sensor Network (WSN) is a modern technology with a wide range of
applications and greatly attractive benefits, for example, self-governing, low expenditure on …

A systematic review on elliptic curve cryptography algorithm for internet of things: Categorization, application areas, and security

AE Adeniyi, RG Jimoh, JB Awotunde - Computers and Electrical …, 2024 - Elsevier
Cyberattacks on the Internet of Things (IoT) may be avoided by implementing cybersecurity
protocols on IoT devices, platform packages, and Internet tools. A significant problem is …

An effective and enhanced RSA based public key encryption scheme (XRSA)

R Imam, F Anwer, M Nadeem - International Journal of Information …, 2022 - Springer
Cryptography is the mechanism of providing significant security services such as
confidentiality, authentication, and integrity. These services are essentially more important in …

AI-HybridChain: Picturized Authentication and DRL based Access Control Method with Secure Two Fold Revocation for Ensuring Cloud Computing Security

SC Krishnan - Future Generation Computer Systems, 2024 - Elsevier
The Internet of Things is susceptible to seepage of private information during the data
sharing. To circumvent this problem, access control and secure data sharing have been …

A systematic literature review on software security testing using metaheuristics

F Ahsan, F Anwer - Automated Software Engineering, 2024 - Springer
The security of an application is critical for its success, as breaches cause loss for
organizations and individuals. Search-based software security testing (SBSST) is the field …

Blockchain‐Enabled Decentralized Healthcare Data Exchange: Leveraging Novel Encryption Scheme, Smart Contracts, and Ring Signatures for Enhanced Data …

S Vidhya, PM Siva Raja… - International Journal of …, 2024 - Wiley Online Library
The healthcare industry has undergone a digital transformation in recent years, with the
adoption of electronic health records (EHRs) becoming increasingly prevalent. While this …

A Study of Elliptic Curve Cryptography and Its Applications

U Vijay Nikhil, Z Stamenkovic… - International Journal of …, 2024 - World Scientific
This paper aims to provide a comprehensive review on Elliptic Curve Cryptography (ECC), a
public key cryptographic system and its applications. The paper discusses important …

Practically adaptable CPABE based Health-Records sharing framework

R Imam, F Anwer - arxiv preprint arxiv:2403.06347, 2024 - arxiv.org
With recent elevated adaptation of cloud services in almost every major public sector, the
health sector emerges as a vulnerable segment, particularly in data exchange of sensitive …

Hybrid Cryptography Techniques for Data Security in Cloud Computing

KK Reddy, AR Chadha, PS Nikhil… - … on Computing, Power …, 2024 - ieeexplore.ieee.org
The Prime objective of cloud computing is that to the centralize processing and storage
capabilities. Since cloud computing elevates performance requirements to greater heights, it …