Amalan Joseph Antony's scientific contributions
What is this page?
This page lists the scientific contributions of an author, who either does not have a ResearchGate profile, or has not yet added these contributions to their profile.
It was automatically created by ResearchGate to create a record of this author's body of work. We create such pages to advance our goal of creating and maintaining the most comprehensive scientific repository possible. In doing so, we process publicly available (personal) data relating to the author as a member of the scientific community.
If you're a ResearchGate member, you can follow this page to keep up with this author's work.
If you are this author, and you don't want us to display this page anymore, please let us know.
It was automatically created by ResearchGate to create a record of this author's body of work. We create such pages to advance our goal of creating and maintaining the most comprehensive scientific repository possible. In doing so, we process publicly available (personal) data relating to the author as a member of the scientific community.
If you're a ResearchGate member, you can follow this page to keep up with this author's work.
If you are this author, and you don't want us to display this page anymore, please let us know.
Publications (3)
Secure exchange of data among the various stake holders of healthcare systems is of prime importance. As the size of the healthcare networks grew, several variants of Public Key Infrastructures (PKIs) were proposed as a means to achieve reliable authentication, confidentiality, non-repudiation, etc. The most prevalent approach to PKI has been the u...
Citations
... In order to improve storage, communication, reaction time, and resistance against malicious nodes, Belattaf [8] offers a distributed public-key management infrastructure that is both dependable and adaptable. Using a different strategy, Antony [9] proposes a blockchain-based PKI that provides safe data sharing for IoT-based healthcare systems. Balakrichenan [10] investigates the creation of a PKI for the IoT by utilizing the Domain Name System (DNS) infrastructure, especially the DNS-based Authentication of Named Entities protocol (DANE) and DNS's Security Extensions (DNSSEC). ...