Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (14)
  • Open Access

    ARTICLE

    Secured Data Storage Using Deduplication in Cloud Computing Based on Elliptic Curve Cryptography

    N. Niyaz Ahamed*, N. Duraipandian

    Computer Systems Science and Engineering, Vol.41, No.1, pp. 83-94, 2022, DOI:10.32604/csse.2022.020071

    Abstract The tremendous development of cloud computing with related technologies is an unexpected one. However, centralized cloud storage faces few challenges such as latency, storage, and packet drop in the network. Cloud storage gets more attention due to its huge data storage and ensures the security of secret information. Most of the developments in cloud storage have been positive except better cost model and effectiveness, but still data leakage in security are billion-dollar questions to consumers. Traditional data security techniques are usually based on cryptographic methods, but these approaches may not be able to withstand an attack from the cloud server's… More >

  • Open Access

    ARTICLE

    An IoT Based Secure Patient Health Monitoring System

    Kusum Yadav1, Ali Alharbi1, Anurag Jain2,*, Rabie A. Ramadan1

    CMC-Computers, Materials & Continua, Vol.70, No.2, pp. 3637-3652, 2022, DOI:10.32604/cmc.2022.020614

    Abstract Internet of things (IoT) field has emerged due to the rapid growth of artificial intelligence and communication technologies. The use of IoT technology in modern healthcare environments is convenient for doctors and patients as it can be used in real-time monitoring of patients, proper administration of patient information, and healthcare management. However, the usage of IoT in the healthcare domain will become a nightmare if patient information is not securely maintained while transferring over an insecure network or storing at the administrator end. In this manuscript, the authors have developed a secure IoT healthcare monitoring system using the Blockchain-based XOR… More >

  • Open Access

    ARTICLE

    Multi Level Key Exchange and Encryption Protocol for Internet of Things (IoT)

    Poomagal C T1,∗, Sathish kumar G A2, Deval Mehta3

    Computer Systems Science and Engineering, Vol.35, No.1, pp. 51-63, 2020, DOI:10.32604/csse.2020.35.051

    Abstract The burgeoning network communications for multiple applications such as commercial, IoT, consumer devices, space, military, and telecommunications are facing many security and privacy challenges. Over the past decade, the Internet of Things (IoT) has been a focus of study. Security and privacy are the most important problems for IoT applications and are still facing huge difficulties. To promote this high-security IoT domain and prevent security attacks from unauthorized users, keys are frequently exchanged through a public key exchange algorithm. This paper introduces a novel algorithm based on Elliptic Curve Cryptography(ECC) for multi-level Public Key Exchange and Encryption Mechanism. It also… More >

  • Open Access

    ARTICLE

    Optimal Adaptive Genetic Algorithm Based Hybrid Signcryption Algorithm for Information Security

    R. Sujatha1, M. Ramakrishnan2, N. Duraipandian3, B. Ramakrishnan4

    CMES-Computer Modeling in Engineering & Sciences, Vol.105, No.1, pp. 47-68, 2015, DOI:10.3970/cmes.2015.105.047

    Abstract The functions of digital signature and public key encryption are simultaneously fulfilled by signcryption, which is a cryptographic primitive. To securely communicate very large messages, the cryptographic primitive called signcryption efficiently implements the same and while most of the public key based systems are suitable for small messages, hybrid encryption (KEM-DEM) provides a competent and practical way. In this paper, we develop a hybrid signcryption technique. The hybrid signcryption is based on the KEM and DEM technique. The KEM algorithm utilizes the KDF technique to encapsulate the symmetric key. The DEM algorithm utilizes the Adaptive Genetic Algorithm based Elliptic curve… More >

Displaying 11-20 on page 2 of 14. Per Page