A comprehensive survey of cryptography key management systems

S Rana, FK Parast, B Kelly, Y Wang, KB Kent - Journal of Information …, 2023 - Elsevier
Cryptographic methods have been extensively employed in various systems to address
security objectives, such as data confidentiality, authentication, and secure communication …

A review on propagation of secure data, prevention of attacks and routing in mobile ad-hoc networks

GM Borkar, AR Mahajan - International Journal of …, 2020 - inderscienceonline.com
Wireless communication formly mobile ad-hoc network (MANET) plays a significant role in
modern technology for transmitting the packets from source node to destination node. The …

New secure healthcare system using cloud of things

EA Alkeem, D Shehada, CY Yeun, MJ Zemerly, J Hu - Cluster Computing, 2017 - Springer
Modern healthcare services are serving patients needs by using new technologies such as
wearable devices or cloud of things. The new technology provides more facilities and …

A new adaptive trust and reputation model for mobile agent systems

D Shehada, CY Yeun, MJ Zemerly, M Al-Qutayri… - Journal of Network and …, 2018 - Elsevier
Mobile agents (MAs) are being widely used in distributed applications development. The
motivation behind the interest in MAs is derived from the various advantages they offer, such …

A dynamic and cross-domain authentication asymmetric group key agreement in telemedicine application

Z Qikun, G Yong, Z Quanxin, W Ruifang… - IEEE Access, 2018 - ieeexplore.ieee.org
Telemedicine offers medical services remotely via telecommunications systems and
physiological monitoring devices. Group-oriented communication is an important application …

An authenticated asymmetric group key agreement based on attribute encryption

Q Zhang, Y Gan, L Liu, X Wang, X Luo, Y Li - Journal of Network and …, 2018 - Elsevier
Secure communication among terminals in a group is necessary in Internet of Things (IoT).
Such as, the Vehicular Ad-hoc Network (VANET) is used to communicate with the vehicles to …

BROSMAP: A novel broadcast based secure mobile agent protocol for distributed service applications

D Shehada, CY Yeun, MJ Zemerly… - Security and …, 2017 - Wiley Online Library
Mobile agents are smart programs that migrate from one platform to another to perform the
user task. Mobile agents offer flexibility and performance enhancements to systems and …

A hierarchical group key agreement protocol using orientable attributes for cloud computing

Q Zhang, X Wang, J Yuan, L Liu, R Wang, H Huang… - Information …, 2019 - Elsevier
Group key agreement is one of the key technologies for ensuring information exchange
security among group members. Due to different sensitivities of the information, group …

Secure lightweight ECC-based protocol for multi-agent IoT systems

H Hasan, T Salah, D Shehada… - 2017 IEEE 13th …, 2017 - ieeexplore.ieee.org
The rapid increase of connected devices and the major advances in information and
communication technologies have led to great emergence in the Internet of Things (IoT). IoT …

A specific‐targeting asymmetric group key agreement for cloud computing

Y Tan, J Zheng, Q Zhang, X Zhang… - Chinese Journal of …, 2018 - Wiley Online Library
When the information is exchanged and transmitted among the group members in mobile
cloud environment, the group members may distribute different security domains. The …