A comprehensive survey of cryptography key management systems
Cryptographic methods have been extensively employed in various systems to address
security objectives, such as data confidentiality, authentication, and secure communication …
security objectives, such as data confidentiality, authentication, and secure communication …
A review on propagation of secure data, prevention of attacks and routing in mobile ad-hoc networks
GM Borkar, AR Mahajan - International Journal of …, 2020 - inderscienceonline.com
Wireless communication formly mobile ad-hoc network (MANET) plays a significant role in
modern technology for transmitting the packets from source node to destination node. The …
modern technology for transmitting the packets from source node to destination node. The …
New secure healthcare system using cloud of things
Modern healthcare services are serving patients needs by using new technologies such as
wearable devices or cloud of things. The new technology provides more facilities and …
wearable devices or cloud of things. The new technology provides more facilities and …
A new adaptive trust and reputation model for mobile agent systems
Mobile agents (MAs) are being widely used in distributed applications development. The
motivation behind the interest in MAs is derived from the various advantages they offer, such …
motivation behind the interest in MAs is derived from the various advantages they offer, such …
A dynamic and cross-domain authentication asymmetric group key agreement in telemedicine application
Z Qikun, G Yong, Z Quanxin, W Ruifang… - IEEE Access, 2018 - ieeexplore.ieee.org
Telemedicine offers medical services remotely via telecommunications systems and
physiological monitoring devices. Group-oriented communication is an important application …
physiological monitoring devices. Group-oriented communication is an important application …
An authenticated asymmetric group key agreement based on attribute encryption
Secure communication among terminals in a group is necessary in Internet of Things (IoT).
Such as, the Vehicular Ad-hoc Network (VANET) is used to communicate with the vehicles to …
Such as, the Vehicular Ad-hoc Network (VANET) is used to communicate with the vehicles to …
BROSMAP: A novel broadcast based secure mobile agent protocol for distributed service applications
Mobile agents are smart programs that migrate from one platform to another to perform the
user task. Mobile agents offer flexibility and performance enhancements to systems and …
user task. Mobile agents offer flexibility and performance enhancements to systems and …
A hierarchical group key agreement protocol using orientable attributes for cloud computing
Group key agreement is one of the key technologies for ensuring information exchange
security among group members. Due to different sensitivities of the information, group …
security among group members. Due to different sensitivities of the information, group …
Secure lightweight ECC-based protocol for multi-agent IoT systems
The rapid increase of connected devices and the major advances in information and
communication technologies have led to great emergence in the Internet of Things (IoT). IoT …
communication technologies have led to great emergence in the Internet of Things (IoT). IoT …
A specific‐targeting asymmetric group key agreement for cloud computing
Y Tan, J Zheng, Q Zhang, X Zhang… - Chinese Journal of …, 2018 - Wiley Online Library
When the information is exchanged and transmitted among the group members in mobile
cloud environment, the group members may distribute different security domains. The …
cloud environment, the group members may distribute different security domains. The …