CALRA: practical conditional anonymous and leakage-resilient authentication scheme for vehicular crowdsensing communication

J **ao, Y Ren, J Du, Y Zhao, S Kumari… - IEEE Transactions …, 2024 - ieeexplore.ieee.org
Vehicular crowdsensing (VCS) has aroused extensive attention because of its ability to
provide comprehensive data services for intelligent transportation systems. Wherein, secure …

Similarity-based deduplication and secure auditing in IoT decentralized storage

Y Gao, L Chen, J Han, G Wu, S Liu - Journal of Systems Architecture, 2023 - Elsevier
Data storage is becoming more difficult due to the network technology's rapid development,
especially with the significant advancement in Internet of Things (IoT). To solve this problem …

Secure pairing-free certificateless aggregate signcryption scheme for IoT

D Chen, F Zhou, Y Liu, L Li, Y Liang - Journal of Systems Architecture, 2024 - Elsevier
The widespread application of wireless sensor technology in the Internet of Things (IoT)
industry significantly enhances productivity. However, the large scale deployment of IoT and …

Provably secure optimal homomorphic signcryption for satellite-based internet of things

KA Farrea, Z Baig, RRM Doss, D Liu - Computer Networks, 2024 - Elsevier
Satellites have long been reliable and widely used mediums for communication. With recent
advancements in the Internet of Things (IoT), satellite-based IoT has emerged, enhancing …

Integrated and accountable data sharing for smart grids with fog and dual-blockchain assistance

S Liu, L Chen, L Chen, J Lai - IEEE Transactions on Industrial …, 2023 - ieeexplore.ieee.org
Combining a fog layer to aggregate and process data for smart grids is a straightforward
approach, yet it inevitably leads to trust issues and audition difficulty. Most existing data …

Multireceiver conditional anonymous singcryption for IoMT crowdsourcing

Y Wang, X Zhang, R Chen, HN Dai… - IEEE Internet of …, 2023 - ieeexplore.ieee.org
The advent of the Internet of Medical Things (IoMT) has greatly fastened the digitization of
current medical institutions. Mobile crowdsourcing is an effective strategy for health data …

Revocable certificate-based broadcast signcryption scheme for edge-enabled IIoT

Y Gao, L Deng, S Feng, H Liu, B Li, N Wang - Information Sciences, 2025 - Elsevier
In edge computing-enabled Industrial Internet of Things (edge-enabled IIoT), edge
computing facilitates data processing with reduced latency, enhanced reliability, and …

A sustainable mutual authentication protocol for IoT-Fog-Cloud environment

SP Satpathy, S Mohanty, M Pradhan - Peer-to-Peer Networking and …, 2025 - Springer
This paper introduces a mutual authentication protocol designed for the IoT-Fog-Cloud
environment, utilizing Elliptic Curve Cryptography (ECC). The proposed protocol supports …

Data protection between IoT devices and cloud computing: using PRINCE lightweight algorithm

AG Hilal, ME Manaa - 2023 6th international conference on …, 2023 - ieeexplore.ieee.org
The Internet of Things (loT) is a fast-growing field that involves connecting a wide variety of
devices and sensors to the Internet to collect and share data. The vast amount of data …