2021
DOI: 10.1007/s11277-021-08966-3
|View full text |Cite
|
Sign up to set email alerts
|

Privacy-Preserving and Energy-Centered QoS for IoT Using XOR-RSA and BM-SSA

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2

Citation Types

0
4
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
3
1

Relationship

1
3

Authors

Journals

citations
Cited by 4 publications
(4 citation statements)
references
References 22 publications
0
4
0
Order By: Relevance
“…They mainly implemented this scheme using the Raspberry Pi and Desktop PC and the efficiency of this scheme is analyzed in terms of different attacks. Manzoor et al 23 developed a proxy re‐encryption scheme to make the sensible data visible to only the authorized individuals of the smart contract. This scheme is efficient for sensor data storage, trade, and management.…”
Section: Related Workmentioning
confidence: 99%
See 3 more Smart Citations
“…They mainly implemented this scheme using the Raspberry Pi and Desktop PC and the efficiency of this scheme is analyzed in terms of different attacks. Manzoor et al 23 developed a proxy re‐encryption scheme to make the sensible data visible to only the authorized individuals of the smart contract. This scheme is efficient for sensor data storage, trade, and management.…”
Section: Related Workmentioning
confidence: 99%
“…We have previously presented an energy‐efficient secure IoT‐based data transmission framework using blockchain technology and secure hash algorithm 512 (SHA512) 23 . The IoT data is encrypted using an eXclusive OR‐Rivest, Shamir, Adleman (XOR‐RSA) algorithm, and the data is securely stored in the blockchain‐centric cloud.…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations