Author:
Imam Raza,Kumar Kaushal,Raza Syed Mehran,Sadaf Rumi,Anwer Faisal,Fatima Noor,Nadeem Mohammad,Abbas Mohamed,Rahman Obaidur
Funder
Khon Kaen University
Deanship of Scientific Research, King Faisal University
King Khalid University
Reference117 articles.
1. IoT devices, user authentication, and data management in a secure, validated manner through the blockchain system;Ahsan;Wirel. Commun. Mob. Comput.,2022
2. Survey on revocation in ciphertext-policy attribute-based encryption;Al-Dahhan;Sensors (Switzerland),2019
3. Hyper elliptic curve based certificateless signcryption scheme for secure IIoT communications;Ali;Comput. Mater. Contin.,2022
4. Secure access for healthcare data in the cloud using Ciphertext-Policy Attribute-Based Encryption;Alshehri,2012
5. Anas, M., R. Imam, and F. Anwer, Elliptic Curve Cryptography in Cloud Security: A Survey, 2022 12th Int. Conf. Cloud Comput. Data Sci. Eng., pp. 112–117, 2022, doi: 10.1109/CONFLUENCE52989.2022.9734138.
Cited by
11 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献