Journal Title: International Journal of Science Engineering and Advance Technology - Year 2017, Vol 5, Issue 7
Abstract
We initially give a productive certificateless signcryption plan and afterward outline a get to control conspire for the WBANs utilizing the given signcryption. Our plan accomplishes classification, respectability, validation, non-disavowal, open unquestionable status, and ciphertext validness. Contrasted and existing three get to control plans utilizing signcryption, our plan has the slightest computational cost and vitality utilization for the controller. Moreover, our plan has neither key escrow nor open key authentications, since it depends on certificateless cryptography.
Authors and Affiliations
A. Anuradha| H.O.D,Dept. of M.C.A, Dr. C.S.N Degree& P.G College, Industrial Estate, Bhimavaram , W.G.DT,AP, India, A. Sravani| Student,Dept. of M.C.A, Dr. C.S.N Degree& P.G College, Industrial Estate, Bhimavaram , W.G.DT,AP, India
A Novel Approach of Privacy Preserving Data With Anonymizing Tree Structure
Data anonymization techniques have been proposed in order to allow processing of personal data without compromising user’s privacy. the data management community is facing a big challenge to protect personal inform...
Predictive Torque Control Scheme for Three-Phase Four-Switch Inverter - Fed Induction Motor Drive
The four-switch three-stage (B4) inverter, having a lower number of switches, was first introduced for the likelihood of decreasing the inverter cost, and it turned out to be exceptionally appealing as it can be used...
Blending Cloud Mode With Well-Balanced Recognised Redundancy Elimination Technique
Data deduplication is a critical system in support dispose of excess information as an option of enthralling records; it provisions simply distinct copy of file. Together with the whole associations stockpiling patte...
Challenging Leech Assault Commencing Wireless Adhoc Set of Connections
An ad hoc network could be a cluster of wireless nodes, during which every node will communicate over multi hop methods to the other node while not the assistance of any pre-existing infrastructure like base station...
Cloud Assisted Mobile Access of Health Data With Privacy and Audit Ability
Monitoring and advising patients via mobile health care system is the current trend in medical field that acts as a life saver due to its availability at anytime and anywhere. This e-healthcare system requires patien...