Design of secure key management and user authentication scheme for fog computing services

M Wazid, AK Das, N Kumar, AV Vasilakos - Future Generation Computer …, 2019 - Elsevier
Fog computing (fog networking) is known as a decentralized computing infrastructure in
which data, applications, compute as well as data storage are scattered in the most logical …

[PDF][PDF] Advanced Authentication Mechanisms for Identity and Access Management in Cloud Computing.

A Alsirhani, M Ezz, AM Mostafa - Computer Systems Science & …, 2022 - cdn.techscience.cn
Identity management is based on the creation and management of user identities for
granting access to the cloud resources based on the user attributes. The cloud identity and …

Hybrid state engineering of phase‐change metasurface for all‐optical cryptography

C Choi, SE Mun, J Sung, K Choi… - Advanced Functional …, 2021 - Wiley Online Library
Abstract Chalcogenide material Ge2Sb2Te5 (GST) has bistable phases, the so‐called
amorphous and crystalline phases that exhibit large refractive index contrast. It can be …

Heterogeneous signcryption with equality test for IIoT environment

H **ong, Y Zhao, Y Hou, X Huang, C **… - IEEE Internet of …, 2020 - ieeexplore.ieee.org
The existing signcryption schemes with equality testing are aimed at a sole cryptosystem
and not suitable for the sophisticated heterogeneous network of Industrial Internet of Things …

Heterogeneous signcryption scheme from IBC to PKI with equality test for WBANs

H **ong, Y Hou, X Huang, Y Zhao… - IEEE Systems …, 2021 - ieeexplore.ieee.org
The signcryption protocols supporting the equality test are only for a single system rather
than a flexible heterogeneous environment of wireless body area networks (WBANs). In this …

A survey of public-key encryption with search functionality for cloud-assisted IoT

H **ong, T Yao, H Wang, J Feng… - IEEE Internet of Things …, 2021 - ieeexplore.ieee.org
Nowadays, Internet of Things (IoT) is an attractive system to provide broad connectivity of a
wide range of applications, and clouds are natural promoters. Cloud-assisted IoT combines …

Secure identity-based data sharing and profile matching for mobile healthcare social networks in cloud computing

Q Huang, W Yue, Y He, Y Yang - IEEE Access, 2018 - ieeexplore.ieee.org
Cloud computing and social networks are changing the way of healthcare by providing
realtime data sharing in a cost-effective manner. However, data security issue is one of the …

Ciphertext-policy attribute-based encryption with delegated equality test in cloud computing

Q Wang, L Peng, H **ong, J Sun, Z Qin - IEEE Access, 2017 - ieeexplore.ieee.org
Public key encryption supporting equality test (referred to as PKE-ET) provides the capability
of testing the equivalence between two messages encrypted under different public keys …

Key-policy attribute-based encryption with equality test in cloud computing

H Zhu, L Wang, H Ahmad, X Niu - IEEE Access, 2017 - ieeexplore.ieee.org
The privacy of users must be considered as the utmost priority in distributed networks. To
protect the identities of users, attribute-based encryption (ABE) was presented by Sahai et …

A blockchain-based proxy re-encryption with equality test for vehicular communication systems

B Chen, D He, N Kumar, H Wang… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
Vehicular communication systems (VCS) are likely to play an increasingly important role in
future smart city design, for example by improving road safety and traffic efficiency. However …