TENCON 2019 - 2019 IEEE Region 10 Conference (TENCON) 2019
DOI: 10.1109/tencon.2019.8929266
|View full text |Cite
|
Sign up to set email alerts
|

SIRLC: Secure Information Retrieval using Lightweight Cryptography in HIoT

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
6
3

Relationship

2
7

Authors

Journals

citations
Cited by 12 publications
(5 citation statements)
references
References 18 publications
0
5
0
Order By: Relevance
“…CE's clients and ventures rely heavily on the types of help they provide. Various exploration endeavors and arrangements have been proposed to go to protection and security challenges [10][11][12][13].…”
Section: A Related Workmentioning
confidence: 99%
“…CE's clients and ventures rely heavily on the types of help they provide. Various exploration endeavors and arrangements have been proposed to go to protection and security challenges [10][11][12][13].…”
Section: A Related Workmentioning
confidence: 99%
“…At the point when iterative techniques for programming improvement or lithe strategies are utilized, the framework prerequisites are gradually evolved in corresponding with plan and execution. With the cascade model necessities are created before plan and execution [11][14] [16].…”
Section: Requirement-oriented Approachmentioning
confidence: 99%
“…Patient data is enciphered to ensure authoritative access to patient's sensitive information. In the framework provided by Padmashree et al [31], the patient gives the key to the specialist. While in emergency-care, a patient offers an Attribute-Based-Key (ABK) with a lot of emergency-supporting representatives and allows access to the specialist for using the Emergency Key (EK).…”
Section: Hi-forgery /Eavesdroppingmentioning
confidence: 99%