A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2022; you can also visit the original URL.
The file type is application/pdf
.
Filters
Hash Function Based Keyword Searchable Encryption Framework in Cloud Server Using MD5 and MECC
2021
Journal of Information Hiding and Privacy Protection
This issue could be solved by using various algorithms like the Certificateless Hashed Public Key Authenticated Encryption with Keyword Search (CL-HPAEKS) which utilizes the Modified Elliptic Curve Cryptography ...
The use of Public Key Encryptions with keyword search (PEKS) provides security against the untrustworthy thirdparty search capability on publicly encryption keys without revealing the data's contents. ...
Conflicts of Interest: The authors declare that they have no conflicts of interest to report regarding the present study. ...
doi:10.32604/jihpp.2021.027834
fatcat:llr3bovmmbc5rntw6mmgom6ktm
A Review of Functional Encryption in IoT Applications
2022
Sensors
Functional encryption is an exciting new paradigm of public-key encryption that supports fine-grained access control, generalizing a range of existing fine-grained access control mechanisms. ...
The Internet of Things (IoT) represents a growing aspect of how entities, including humans and organizations, are likely to connect with others in their public and private interactions. ...
PE with Equality Testing in Cloud Computing-The work in [109] presented the concept of attribute-hiding PE with an equality test by incorporating the notions of publickey encryption with the equality ...
doi:10.3390/s22197567
pmid:36236664
pmcid:PMC9573314
fatcat:slcetffyzzfffdq4gav72yvfly
Security analysis and secure channel-free certificateless searchable public key authenticated encryption for a cloud-based Internet of things
2020
PLoS ONE
Compared with other certificateless public key searchable encryption schemes, this scheme has higher security and comparable efficiency. ...
With the rapid development of informatization, an increasing number of industries and organizations outsource their data to cloud servers, to avoid the cost of local data management and to share data. ...
Author Contributions Conceptualization: Bin Wu, Caifen Wang, Hailong Yao. ...
doi:10.1371/journal.pone.0230722
pmid:32271788
fatcat:f63n4b52xbesdlsz2jrlh6jzvq
Blockchain-based trust management in cloud computing systems: a taxonomy, review and future directions
2021
Journal of Cloud Computing: Advances, Systems and Applications
However, a large amount of evidence shows that cloud computing is facing with serious security and trust crisis, and building a trust-enabled transaction environment has become its key factor. ...
Its unique features in operating rules and traceability of records ensure the integrity, undeniability and security of the transaction data. ...
Acknowledgments The authors would like to thank the support of the laboratory, university and government, and the hard work of the editors and reviewers. ...
doi:10.1186/s13677-021-00247-5
fatcat:ncwagc2rhzgrxfrc4u3kabel4i
Lightweight Searchable Public-Key Encryption for Cloud-Assisted Wireless Sensor Networks
2018
IEEE Transactions on Industrial Informatics
Searchable public-key encryption (SPE) is a promising method to address this problem. ...
In theory, it allows sensors to upload public-key ciphertexts to the cloud, and the owner of these sensors can securely delegate a keyword search to the cloud and retrieve the intended data while maintaining ...
Lightweight Searchable Public-Key Encryption for Cloud-Assisted Wireless Sensor Networks I. ...
doi:10.1109/tii.2017.2784395
fatcat:untiuzkq4zfjvpm6fpcz2fp2iu
2021 Index IEEE Internet of Things Journal Vol. 8
2021
IEEE Internet of Things Journal
The Author Index contains the primary entry for each item, listed under the first author's name. ...
Note that the item title is found only under the primary entry in the Author Index. ...
., +, JIoT Oct. 1, 2021 14874-14895 Encryption Heterogeneous Signcryption With Equality Test for IIoT Environment. ...
doi:10.1109/jiot.2022.3141840
fatcat:42a2qzt4jnbwxihxp6rzosha3y
Survey on cyberspace security
2015
Science China Information Sciences
Cyberspace is the collection of all information systems; it is the information environment for human survival. Therefore, it is necessary to ensure the security of cyberspace. ...
Along with the rapid development and wide application of information technology, human society has entered the information era. In this era, people live and work in cyberspace. ...
We would like to thank the following for their help in writing this article: FU JianMin, ZHANG LiQiang, YUAN Wei, XI Ning, LU Di, WU Jun. ...
doi:10.1007/s11432-015-5433-4
fatcat:b2tv6gvovngxhlz7iukug2ehiy
2020 Index IEEE Transactions on Vehicular Technology Vol. 69
2020
IEEE Transactions on Vehicular Technology
+ Check author entry for coauthors ami-mFading Channels With Integer and Non-Integerm; TVT March 2020 2785-2801 Hoang, T.M., Tran, X.N., Nguyen, B.C., and Dung, L.T., On the Performance of MIMO Full-Duplex ...
Dec. 2020 16218-16223 Hoon-Kim, T., see Kumar, G., TVT July 2020 7707-7722 Horlin, F., see Monfared, S., TVT Oct. 2020 11369-11382 Horng, S., Lu, C., and Zhou, W., An Identity-Based and Revocable Data-Sharing ...
., +, TVT June 2020 5799-5812
A Blockchain-Based Searchable Public-Key Encryption With Forward and
Backward Privacy for Cloud-Assisted Vehicular Social Networks. ...
doi:10.1109/tvt.2021.3055470
fatcat:536l4pgnufhixneoa3a3dibdma
2021 Index IEEE Transactions on Vehicular Technology Vol. 70
2021
IEEE Transactions on Vehicular Technology
The Author Index contains the primary entry for each item, listed under the first author's name. ...
Note that the item title is found only under the primary entry in the Author Index. ...
., +, TVT Nov. 2021 Blockchain-Assisted Certificateless Key Agreement Protocol for Internet of Vehicles in Smart Transportation. ...
doi:10.1109/tvt.2022.3151213
fatcat:vzuzqu54irebpibzp3ykgy5nca
Online) International Journal of Network Security is published both in traditional paper form (ISSN 1816-353X) and in Internet
2017
International Journal of Network Security
unpublished
Encryption can be complex and difficult without infrastructure. It is not suitable to apply to the equipment with low computing resources, such as Internet of Things (IoT) application. ...
With the characteristic of spatial diversity and low cost, cooperative system is a tendency for the future communications. ...
The authors gratefully acknowledge the anonymous reviewers for their valuable comments.
Acknowledgments The authors gratefully acknowledge the anonymous reviewers for their valuable comments. ...
fatcat:vy4pp4thsfcrpakpwdjmdgjuoy
Online) International Journal of Network Security is published both in traditional paper form
2016
International Journal of Network Security
unpublished
Most of the privacy-protection schemes adopting chaotic maps are usually by symmetric cryptography for guaranteeing identity hiding. This will lead to a high calculated amount. ...
Then a new PPS authenticated key agreement protocol is given based on chaotic maps. Security of the scheme is based on chaotic maps hard problems and a secure one way hash function. ...
Acknowledgments The authors gratefully acknowledge the anonymous reviewers for their valuable comments.
Acknowledgments ...
fatcat:3gborlznmrac3ebiwzxjjy5jly
Online) International Journal of Network Security is published both in traditional paper form
2016
International Journal of Network Security
unpublished
For this reason, we do not need the certificate authority (CA) to store and manage users' certificates and public keys. ...
Certificateless-based signature can also overcome the certificate management problem and the key escrow problem of the traditional signature system. ...
The authors gratefully acknowledge the reviewers for their valuable comments. ...
fatcat:u6ux7gsrj5efxp3xc4y2gpmahu