Proxy re-encryption: Analysis of constructions and its application to secure access delegation
This paper analyzes the secure access delegation problem, which occurs naturally in the
cloud, and postulate that Proxy Re-Encryption is a feasible cryptographic solution, both from …
cloud, and postulate that Proxy Re-Encryption is a feasible cryptographic solution, both from …
MudraChain: Blockchain-based framework for automated cheque clearance in financial institutions
Currently, the burden on the cheque clearing houses in financial institutions is increasing
day-by-day, which necessitates the upgrading of the existing cheque truncation system …
day-by-day, which necessitates the upgrading of the existing cheque truncation system …
Confidentiality-preserving publish/subscribe: A survey
Publish/subscribe (pub/sub) is an attractive communication paradigm for large-scale
distributed applications running across multiple administrative domains. Pub/sub allows …
distributed applications running across multiple administrative domains. Pub/sub allows …
Toward content-centric privacy in ICN: Attribute-based encryption and routing
We design a content-centric privacy scheme for Information-Centric Networking (ICN). We
enhance ICN's ability to support data confidentiality by introducing attribute-based …
enhance ICN's ability to support data confidentiality by introducing attribute-based …
Secure pub-sub: Blockchain-based fair payment with reputation for reliable cyber physical systems
The cyber physical system (CPS) has gained considerable success in large-scale
distributed integration environment. In such systems, the sensor devices collect data which …
distributed integration environment. In such systems, the sensor devices collect data which …
SEEMQTT: secure end-to-end MQTT-based communication for mobile IoT systems using secret sharing and trust delegation
M Hamad, A Finkenzeller, H Liu… - IEEE Internet of …, 2022 - ieeexplore.ieee.org
The publish/subscribe (Pub/Sub) model offers a communication scheme that is appropriate
for a variety of mobile Internet of Things (IoT) systems (eg, autonomous vehicles). In most of …
for a variety of mobile Internet of Things (IoT) systems (eg, autonomous vehicles). In most of …
PU-ABE: Lightweight attribute-based encryption supporting access policy update for cloud assisted IoT
Cloud-assisted IoT applications are gaining an expanding interest, such that IoT devices are
deployed in different distributed environments to collect and outsource sensed data to …
deployed in different distributed environments to collect and outsource sensed data to …
On security in publish/subscribe services: A survey
Publish/subscribe services have encountered considerable success in the building of
modern large-scale mission-critical systems. Such systems are characterized by several non …
modern large-scale mission-critical systems. Such systems are characterized by several non …
Galaxy: A Scalable BFT and Privacy-Preserving Pub/Sub IoT Data Sharing Framework Based on Blockchain
The emergence of the Internet of Things (IoT) technology in recent years has led to a
considerable amount of data to be shared across different organizations. The publish and …
considerable amount of data to be shared across different organizations. The publish and …
Distributed group key management for event notification confidentiality among sensors
There is an increasing involvement of the Internet of Things (IoT) in many of our daily
activities, with the aim of improving their efficiency and effectiveness. We are witnessing the …
activities, with the aim of improving their efficiency and effectiveness. We are witnessing the …