Zobrazeno 1 - 10
of 11
pro vyhledávání: '"Mohammad Beheshti Atashgah"'
With the advent of the Internet of Things (IoT), e-health has become one of the main topics of research. Due to the sensitivity of patient information, patient privacy seems challenging. Nowadays, patient data is usually stored in the cloud in health
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::e98ce157303bd9afc096c0d72a899ce4
http://arxiv.org/abs/2109.14812
http://arxiv.org/abs/2109.14812
Publikováno v:
Wireless Personal Communications. 97:2551-2579
Nicanfar and Leung proposed a multilayer consensus elliptic curve based password authenticated key-exchange (MCEPAK) protocol for smart grid. They claimed that their protocol is secure against possible attacks. In this paper, we show that the MCEPAK
Publikováno v:
ISCISC
In some applications of the Internet of Things (IoT), for privacy preserving and authentication of entities, it is necessary to use ultra-lightweight cryptographic algorithms. In this paper, we propose a new ultra-lightweight authentication protocol
Publikováno v:
ISCISC
Lightweight authentication protocols are crucial for privacy preserving in Internet of Things (IoT). Authentication protocols should be implementable for devices with constrained memory and computational power in this area, in addition to resistance
Publikováno v:
2019 27th Iranian Conference on Electrical Engineering (ICEE).
Strong designated verifier signature scheme is a concept in which a user (signer) can issue a digital signature for a special receiver; i.e. signature is produced in such way that only intended verifier can check the validity of produced signature. O
Publikováno v:
Internet of Things. 12:100290
The Internet of Things (IoT) concept forms the real digital world in which all objects and things are connected. This new concept has undergone major changes to almost all existing applications. The smart health (e-health) domain is one of the most w
Publikováno v:
International Journal of Computer and Electrical Engineering. :766-770
In a ሺ࢚, ሻ threshold proxy signature scheme, the original signer delegate his/her signing power to proxy signers such that any ࢚ or more out of proxy signers can sign messages on behalf of the original signer, but ࢚െ or less
Publikováno v:
International Journal of Machine Learning and Computing. :298-300
Currently, ID-based public key cryptography has got many useful achievements and attracted much attention. Proxy signature scheme enables an original signer to delegate his\her signing capability to a proxy signer to sign messages on behalf of the or
Publikováno v:
20th Iranian Conference on Electrical Engineering (ICEE2012).
This paper presents an e-voting model based on Pret a Voter. Modifications caused a considerable improvement in security and flexibility of the proposed model. Also it has a better chance of public acceptance. In the proposed model, we modified the b
Publikováno v:
20th Iranian Conference on Electrical Engineering (ICEE2012).
In a proxy signature scheme, an original signer delegates his/her signing capability to a proxy signer and then the proxy signer can sign messages on behalf of the original signer. The security of many proxy signature schemes that have been proposed