Research Article
[Retracted] Secure Techniques for Channel Encryption in Wireless Body Area Network without the Certificate
Table 1
Signcryption methods used in asymmetric cryptosystems are classified.
| Attribute-based signcryption algorithms are appropriate for WBAN | [7, 8] | Identity-based WBAN sign encryption techniques | [7, 8] | Methods of signing without the requirement for a certificate for WBAN | [9] | Use of public key infrastructure (PKI) for WBAN sign encryption | [10] | Use of certificate-based WBAN sign encryption | [11] | Heterogeneous methods to WBAN signcryption | [12] |
|
|