Table 11.
Comparative Analysis of WBANs Signcryption Schemes based on Security Hardness.
| Ref. No. | Bilinear Pairing | ECC | HEC |
|---|---|---|---|
| Amin et al. [80] | |||
| Wang and Liu [69] | |||
| Li and Hong [70] | |||
| Jawaid et al. [83] | |||
| Mutaz et al. [71] | |||
| Lu et al. [72] | |||
| Li et al. [73] | |||
| Prameela & Ponmuthuramalingam [74] | |||
| Omala et al. [75] | |||
| Omala et al. [81] | |||
| Gao et al. [82] | |||
| Ullah et al. [84] | |||
| Jawaid et al. [76] | |||
| Noor et al. [85] | |||
| Hu et al. [77] |