1.
J. Tian, G. Ruifang and X. Jing, “Stern–Brocot-Based Non-Repudiation Dynamic Provable Data Possession,” in IEEE Access, vol. 7, pp. 96686-96694, 2019, doi: 10.1109/ACCESS.2019.2916173.
2.
D. Goyal, O. P. Verma, S. Balamurugan, Sheng-Lung Peng, Design and Analysis of Security Protocol for Communication, Wiley, ISBN: 9781119555643, 1119555647, 2020
3.
D.C. Wilson, Cybersecurity, MIT Press, ISBN: 9780262542548, 0262542544, 2021
4.
I.Pekaric, C.Sauerwein, S.Haselwanter, M.Felderer, “A taxonomy of attack mechanisms in the automotive domain,” Elsevier-Computer Standards & Interfaces, Volume 78, October 2021
5.
R. Khatoun, Cybersecurity in Smart Homes-Architectures, Solutions and Technologies, Wiley, ISBN: 9781119987444, 111998744X, 2020
6.
L. Bock, Modern Cryptography for Cybersecurity Professionals, Packt Publishing, ISBN: 9781838644352, 1838644350, 2021
7.
A. Wirth, C. Gates, J. Smith, Medical Device Cybersecurity for Engineers and Manufacturers, Artech House, ISBN: 9781630818166, 163081816X, 2020
8.
M. Faisal, I. Ali, M.S. Khan, J. Kim, and S.M. Kim, “Cyber Security and Key Management Issues for Internet of Things: Techniques, Requirements, and Challenges,” Hindawi-Complexity, Article ID 6619498, DOI: https://doi.org/10.1155/2020/6619498
9.
G. Jayabalasamy, S.Koppu, “High-performance Edwards curve aggregate signature (HECAS) for nonrepudiation in IoT-based applications built on the blockchain ecosystem,” Journal of King Saud University - Computer and Information Sciences, 2021
10.
M. Sookhak, H. Tang, Y. He, F.R. Yu, “Security and Privacy of Smart Cities: A Survey, Research Issues, and Challenges,” IEEE Communications Surveys & Tutorials, VOL. 21, NO. 2, SECOND QUARTER 2019
11.
H. A. Khattaka, M. A. Shah, S. Khan, I.Ali, M. Imran, “Perception layer security in Internet of Things,” Future Generation Computer Systems, Vol.100, pp.144-164, 2019
12.
Divya K.S, Roopashree H.R, Yogeesh A C, “Non-Repudiation-based Network Security System using Multiparty Computation,” International Journal of Advanced Computer Science and Applications, Vol. 13, No. 3, 2022
13.
M. M. Elamir, M. S. Mabrouk, and S. Y. Marzouk, “Secure framework for IoT technology based on RSA and DNA cryptography,” Egyptian Journal of Medical Human Genetics, vol.23, No.116, 2022
14.
Chen, C.-L.; Lim, Z.-Y.; Liao, H.-C.; Deng, Y.-Y. A Traceable and Authenticated IoTs Trigger Event of Private Security Record Based on Blockchain. Appl. Sci. 2021, 11, 2843. https://doi.org/10.3390/app11062843
15.
J. Sun, X. Yao, S. Wang, and Y. Wu, “Non-Repudiation Storage and Access Control Scheme of Insurance Data Based on Blockchain in IPFS,” in IEEE Access, vol. 8, pp. 155145-155155, 2020, doi: 10.1109/ACCESS.2020.3018816.
16.
F. Chen, J. Wang, J. Li, Y. Xu, C. Zhang, T. Xiang, "TrustBuilder: A non-repudiation scheme for IoT cloud applications", ACM-Computer and Security, vol.116, No.C, 2022. DOI: https://doi.org/10.1016/j.cose.2022.102664
17.
W. Fang, W. Chen, W. Zhang, J. Pei, W. Gao, G. Wang, “Digital signature scheme for information non-repudiation in the blockchain: a state of the art review,” EURASIP Journal on Wireless Communications and Networking volume 2020, Article number: 56, 2020
18.
D-H Lee, K. Yim, I-Y Lee, “A Certificateless Aggregate Arbitrated Signature Scheme for IoT Environments,” PubMed Central- Sensors(Basel). vol.20, No.14, 2020. doi: 10.3390/s20143983
19.
J. Kar, X. Liu, F. Li, “CL-ASS: An efficient and low-cost certificateless aggregate signature scheme for wireless sensor networks,” Journal of Information Security and Applications, Vol.61, Issue C, Sep 2021. DOI: https://doi.org/10.1016/j.jisa.2021.102905
20.
J. Shen, Z. Gui, X. Chen, J. Zhang, and Y. Xiang, “Lightweight and Certificateless Multi-Receiver Secure Data Transmission Protocol for Wireless Body Area Networks” in IEEE Transactions on Dependable and Secure Computing, vol. 19, no. 03, pp. 1464-1475, 2022.
21.
K. Sudharani, P. N. K. Sakthivel, “A Secure Encryption Scheme Based on Certificateless Proxy Signature,” Springer, 2018
22.
L. Harn, J. Ren, C. Lin, “Design of DL-based certificateless digital signatures,” Journal of Systems and Software, Vol.82, Issue 5, pp.789-793, 2009
23.
D. Xiang, X. Li, J. Gao, X. Zhang, “A secure and efficient certificateless signature scheme for Internet of Things,” Elsevier- Ad Hoc Networks, Volume 124, 1 January 2022.
24.
Kim, T.; Kim, W.; Seo, D.; Lee, I. Secure Encapsulation Schemes Using Key Recovery System in IoMT Environments. Sensors 2021, 21, 3474. https://doi.org/10.3390/s21103474
25.
J. Singh, V. Kumar, R. Kumar, “An Efficient and Secure RSA Based Certificateless Signature Scheme for Wireless Sensor Networks,” Springer, 2016
26.
D. Toradmalle, J. Muthukuru, B Sathyanarayana, “Lightweight Certificate less Signcryption Scheme Based on Elliptic Curve,” International Journal of Innovative Technology and Exploring Engineering (IJITEE), ISSN: 2278-3075, Volume-8 Issue-10, August 2019
27.
S. Sharmila Deva Selvi, Pandu Rangan Chandrasekaran, “Efficient and provably secure certificateless multi-receiver signcryption,” IIT Madras Conference, Volume: 5324 LNCS, pp.52 - 67, 2008, DOI: 10.1007/978-3-540-88733-1-4
28.
C. Jin, H. Zhu, W. Qin, Z. Chen, Y. Jin, J. Shan, “Heterogeneous online/offline signcryption for secure communication in Internet of Things,” Elsevier-Journal of Systems Architecture, Volume 127, June 2022
29.
W. Zhang, Y. Zhang, C. Guo, Q. An, Y. Guo, X. Liu, S. Zhang, J. Huang, “Certificateless Hybrid Signcryption by a Novel Protocol Applied to Internet of Things,” PubMed Central-Comput Intell Neurosci. 2022. 10.1155/2022/3687332
30.
Meshram, C.; Imoize, A.L.; Aljaedi, A.; Alharbi, A.R.; Jamal, S.S.; Barve, S.K. An Efficient Electronic Cash System Based on Certificateless Group Signcryption Scheme Using Conformable Chaotic Maps. Sensors 2021, 21, 7039. https://doi.org/10.3390/s21217039
31.
Nayab, S. Hussain, A. Alabrah, S. S. Ullah, H. Khattak, T. M. Alfakih, I. Ullah, “An Efficient Online/Offline Signcryption Scheme for Internet of Things in Smart Home,” ACM-Wireless Communications & Mobile ComputingVolume 2022, DOI: https://doi.org/10.1155/2022/4215441
32.
A. M. Abdullah, I. Ullah, M. A. Khan, M. H. Alsharif, S. M. Mostafa, and J. M-T Wu, “An Efficient Multidocument Blind Signcryption Scheme for Smart Grid-Enabled Industrial Internet of Things,” Hindawi-Next-Generation Wireless Networks (NGWN) for Autonomous Intelligent Communications, Article ID 7779152, 2022, DOI:https://doi.org/10.1155/2022/7779152
33.
P. Zhang, Y. Li, H. Chi, “An Elliptic Curve Signcryption Scheme and Its Application,” Hindawi-Wireless Communications and Mobile Computing, Article ID 7499836, 2022, DOI: https://doi.org/10.1155/2022/7499836
34.
Ghosh, S.; Zaman, M.; Plourde, B.; Sampalli, S. A Quantum-Based Signcryption for Supervisory Control and Data Acquisition (SCADA) Networks. Symmetry 2022, 14, 1625. https://doi.org/10.3390/sym14081625
35.
A. P. Sarr, P. B. Seye, T. Ngarenon, "A Practical and Insider Secure Signcryption with Non-interactive Non-repudiation", Springer-2019
36.
R. M. Daniel, E.B. Rajsingh, S. Silas, “A forward secure signcryption scheme with ciphertext authentication for e-payment systems using conic curve cryptography,” Journal of King Saud University - Computer and Information Sciences, Vol.33, No.1, pp.86-98, 2021, DOI: https://doi.org/10.1016/j.jksuci.2018.02.004
37.
Witanto, E.N.; Lee, S.-G. Cloud Storage Data Verification Using Signcryption Scheme. Appl. Sci. 2022, 12, 8602. https://doi.org/10.3390/app12178602
38.
L. Li, X. Lu, K. Wang, “Hash-based signature revisited,” SprinegrOpen-Cybersecurity, vol.5, Article number: 13, 2022
39.
Abbas, G.; Mehmood, A.; Carsten, M.; Epiphaniou, G.; Lloret, J. Safety, Security and Privacy in Machine Learning Based Internet of Things. J. Sens. Actuator Netw. 2022, 11, 38. https://doi.org/10.3390/jsan11030038
40.
S. Capkun, E. Ozturk, G, Tsudik, K. Wust, "ROSEN: RObust and SElective Non-repudiation (for TLS)", ACM-Proceedings of the 2021 on Cloud Computing Security Workshop, November 2021, Pages 97–109, DOI: https://doi.org/10.1145/3474123.3486763
41.
H. K. Alper, A. Küpçü, “Optimally Efficient Multi-party Fair Exchange and Fair Secure Multi-party Computation,” ACM Transactions on Privacy and Security, Vol.25, Issue 1, February 2022, Article No.: 3, pp 1–34, DOI: https://doi.org/10.1145/3477530
42.
P. Kalpana, “Amalgam Of Hamming Weight-Based RSA And Multi-Party Computations To Enhance Security In Multi-Cloud Ambience,” International Journal of Innovative Technology and Exploring Engineering (IJITEE), ISSN: 2278-3075, Vol.8, Issue-10, August 2019
43.
Divya K.S, Dr.RoopaShree H.R, Dr.Yogesh A.C, “Non-Repudiation-based Network Security System using Multiparty Computation,” International Journal of Advanced Computer Science and Applications, Vol. 13, No. 3, 2022, PP 282-289, DOI:10.14569/IJACSA.2022.0130335.
44.
M. Sharaf, J. Chen, E. Keedwell, “Non-repudiation and privacy-preserving sharing of electronic health records,” Taylor & Francis Online, Cogent Engineering, Vol.9, Iss.1, 2022. DOI: https://doi.org/10.1080/23311916.2022.2034374
45.
A. Kumar, “A cloud-based buyer-seller watermarking protocol (CB-BSWP) using semi-trusted third party for copy deterrence and privacy-preserving,” Springer-Multimedia Tools and Applications, vol.81, pages 21417–21448, 2022.
46.
L. Wang, J. Li, L. Zuo, Y. Wen, H. Liu, W. Liu, “T-Tracer: A Blockchain-Aided Symbol Mapping Watermarking Scheme for Traitor Tracing in Non-Repudiation Data Delivery,” ACM-Proceedings of the Fourth ACM International Symposium on Blockchain and Secure Critical Infrastructure, May 2022, Pages 23–34, DOI: https://doi.org/10.1145/3494106.3528674
47.
http://www.cmt-gmbh.de/MICAz.pdf (Accessed on 17-November, 2022).