Design of secure key management and user authentication scheme for fog computing services
Fog computing (fog networking) is known as a decentralized computing infrastructure in
which data, applications, compute as well as data storage are scattered in the most logical …
which data, applications, compute as well as data storage are scattered in the most logical …
[PDF][PDF] Advanced Authentication Mechanisms for Identity and Access Management in Cloud Computing.
Identity management is based on the creation and management of user identities for
granting access to the cloud resources based on the user attributes. The cloud identity and …
granting access to the cloud resources based on the user attributes. The cloud identity and …
Hybrid state engineering of phase‐change metasurface for all‐optical cryptography
Abstract Chalcogenide material Ge2Sb2Te5 (GST) has bistable phases, the so‐called
amorphous and crystalline phases that exhibit large refractive index contrast. It can be …
amorphous and crystalline phases that exhibit large refractive index contrast. It can be …
Heterogeneous signcryption with equality test for IIoT environment
The existing signcryption schemes with equality testing are aimed at a sole cryptosystem
and not suitable for the sophisticated heterogeneous network of Industrial Internet of Things …
and not suitable for the sophisticated heterogeneous network of Industrial Internet of Things …
Heterogeneous signcryption scheme from IBC to PKI with equality test for WBANs
The signcryption protocols supporting the equality test are only for a single system rather
than a flexible heterogeneous environment of wireless body area networks (WBANs). In this …
than a flexible heterogeneous environment of wireless body area networks (WBANs). In this …
A survey of public-key encryption with search functionality for cloud-assisted IoT
Nowadays, Internet of Things (IoT) is an attractive system to provide broad connectivity of a
wide range of applications, and clouds are natural promoters. Cloud-assisted IoT combines …
wide range of applications, and clouds are natural promoters. Cloud-assisted IoT combines …
Secure identity-based data sharing and profile matching for mobile healthcare social networks in cloud computing
Q Huang, W Yue, Y He, Y Yang - IEEE Access, 2018 - ieeexplore.ieee.org
Cloud computing and social networks are changing the way of healthcare by providing
realtime data sharing in a cost-effective manner. However, data security issue is one of the …
realtime data sharing in a cost-effective manner. However, data security issue is one of the …
Ciphertext-policy attribute-based encryption with delegated equality test in cloud computing
Public key encryption supporting equality test (referred to as PKE-ET) provides the capability
of testing the equivalence between two messages encrypted under different public keys …
of testing the equivalence between two messages encrypted under different public keys …
Key-policy attribute-based encryption with equality test in cloud computing
The privacy of users must be considered as the utmost priority in distributed networks. To
protect the identities of users, attribute-based encryption (ABE) was presented by Sahai et …
protect the identities of users, attribute-based encryption (ABE) was presented by Sahai et …
A blockchain-based proxy re-encryption with equality test for vehicular communication systems
Vehicular communication systems (VCS) are likely to play an increasingly important role in
future smart city design, for example by improving road safety and traffic efficiency. However …
future smart city design, for example by improving road safety and traffic efficiency. However …