Cybersecurity based signcryption technique

Design and implementation cybersecurity based signcryption technique to increase the data confidentiality and integrity level in a distributed database system

Challa, S., Das, A.K., Gope, P., Kumar, N., Wu, F. & Vasilakos, A. V. (2020). Design and analysis of authenticated key agreement scheme in cloud-assisted cyber–physical systems. Future Generation Computer Systems. [Online]. 108. pp. 1267–1286. Available from: https://linkinghub.elsevier.com/retrieve/pii/S0167739X17326328.

Colorafi, K. & Bailey, B. (2016). It’s time for innovation in the Health Insurance Portability and Accountability Act (HIPAA). JMIR medical informatics. [Online]. 4 (4). pp. e34. Available from: https://medinform.jmir.org/2016/4/e34.

Greg, P., Trevors, M. & Vrtis, R.A. (2018). A mapping of the health insurance portability and accountability act (HIPAA) security rule to the cyber resilience review (CRR). [Online]. CARNEGIE-MELLON UNIV PITTSBURGH PA PITTSBURGH United States. Available from: http://refhub.elsevier.com/S1084-8045(20)30116-8/sref38.

Imine, Y., Lounis, A. & Bouabdallah, A. (2020). An accountable privacy-preserving scheme for public information sharing systems. Computers & Security. [Online]. 93. pp. 101786. Available from: https://linkinghub.elsevier.com/retrieve/pii/S0167404820300717.

Li, J., Gao, W., Zuo, W. & Liu, X. (2017). Association between rs17095355 polymorphism on 10q24 and susceptibility to biliary atresia: a meta-analysis. The Journal of Maternal-Fetal & Neonatal Medicine. [Online]. 30 (15). pp. 1882–1886. Available from: https://www.tandfonline.com/doi/full/10.1080/14767058.2016.1228102.

Sample Solution