Review of security methods based on classical cryptography and quantum cryptography
S Subramani, SK Svn - Cybernetics and Systems, 2023 - Taylor & Francis
Classical cryptography is the process of hiding information and it manages the secret
knowledge by encrypting the plain text message through the translation of it to an …
knowledge by encrypting the plain text message through the translation of it to an …
PA-CRT: Chinese remainder theorem based conditional privacy-preserving authentication scheme in vehicular ad-hoc networks
Existing security and identity-based vehicular communication protocols used in Vehicular Ad-
hoc Networks (VANETs) to achieve conditional privacy-preserving mostly rely on an ideal …
hoc Networks (VANETs) to achieve conditional privacy-preserving mostly rely on an ideal …
Dual authentication and key management techniques for secure data transmission in vehicular ad hoc networks
Vehicular ad hoc networks (VANETs) are an important communication paradigm in modern-
day mobile computing for exchanging live messages regarding traffic congestion, weather …
day mobile computing for exchanging live messages regarding traffic congestion, weather …
Password-guessing attack-aware authentication scheme based on chinese remainder theorem for 5g-enabled vehicular networks
The new fifth-generation (5G) cellular networks dramatically improve the speed of message
transmissions. Most existing authentication schemes that secure 5G communication rely …
transmissions. Most existing authentication schemes that secure 5G communication rely …
A secured storage and privacy-preserving model using CRT for providing security on cloud and IoT-based applications
S Ganapathy - Computer Networks, 2019 - Elsevier
Cloud computing and Internet of Things (IoT) are emerging technologies which have the
capability to enhance the human daily lifestyle. Moreover, the combination of Cloud …
capability to enhance the human daily lifestyle. Moreover, the combination of Cloud …
A decentralized blockchain-based key management protocol for heterogeneous and dynamic IoT devices
MA Kandi, DE Kouicem, M Doudou, H Lakhlef… - Computer …, 2022 - Elsevier
Secure communication is one of the main challenges that are slowing down the
development of the Internet of Things (IoT). Key Management (KM) is particularly a difficult …
development of the Internet of Things (IoT). Key Management (KM) is particularly a difficult …
Time efficient secure DNA based access control model for cloud computing environment
Abstract The uses of Big Data (BD) are gradually increasing in many new emerging
applications, such as Facebook, eBay, Snapdeal, etc. BD is a term, which is used for …
applications, such as Facebook, eBay, Snapdeal, etc. BD is a term, which is used for …
Mutated k-means algorithm for dynamic clustering to perform effective and intelligent broadcasting in medical surveillance using selective reliable broadcast protocol …
Vehicular ad-hoc Network (VANET) is an emerging type of Mobile ad-hoc Networks
(MANETs) with excellent applications in the intelligent traffic system. Applications in VANETs …
(MANETs) with excellent applications in the intelligent traffic system. Applications in VANETs …
A privacy-preserving data aggregation scheme based on chinese remainder theorem in mobile Crowdsensing system
B Zhu, Y Li, G Hu, M Zhang - IEEE Systems Journal, 2023 - ieeexplore.ieee.org
Mobile crowdsensing provides a large-scale reliable data, since sensing nodes support
wide distribution, flexible mobility, and opportunistic connectivity. The generated data often …
wide distribution, flexible mobility, and opportunistic connectivity. The generated data often …
RHAS: robust hybrid auto-scaling for web applications in cloud computing
The elasticity characteristic of cloud services attracts application providers to deploy
applications in a cloud environment. The scalability feature of cloud computing gives the …
applications in a cloud environment. The scalability feature of cloud computing gives the …