Articles with "certificate based" as a keyword



Photo from wikipedia

Leakage-Resilient Anonymous Multi-Receiver Certificate-Based Key Encapsulation Scheme

Sign Up to like & get
recommendations!
Published in 2023 at "IEEE Access"

DOI: 10.1109/access.2023.3280056

Abstract: Key encapsulation schemes in public key system (PKS) can be used to protect sensitive or private data. Unlike traditional PKS and identity-based PKS, certificate-based PKS (CB-PKS) not only avoids the establishment of complex public key… read more here.

Keywords: certificate; multi receiver; anonymous multi; key encapsulation ... See more keywords
Photo by drew_hays from unsplash

Certificate-Based Anonymous Authentication With Efficient Aggregation for Wireless Medical Sensor Networks

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Internet of Things Journal"

DOI: 10.1109/jiot.2021.3134693

Abstract: Wireless medical sensor networks (WMSNs) have aroused widespread attention in recent years with the development of Internet of Things (IoT) technology. WMSNs offer many new opportunities for healthcare professionals to monitor patients and patient self-monitoring.… read more here.

Keywords: medical sensor; sensor networks; security; wireless medical ... See more keywords