[HTML][HTML] Edge intelligence secure frameworks: Current state and future challenges
E Villar-Rodriguez, MA Pérez, AI Torre-Bastida… - Computers & …, 2023 - Elsevier
At the confluence of two great paradigms such as Edge Computing and Artificial Intelligence,
Edge Intelligence arises. This new concept is about the smart exploitation of Edge …
Edge Intelligence arises. This new concept is about the smart exploitation of Edge …
Privacy-preservation techniques for IoT devices: a systematic mapping study
D Torre, A Chennamaneni, A Rodriguez - IEEE Access, 2023 - ieeexplore.ieee.org
The Internet of Things (IoT) is becoming a pervasive technology entangled in everyday life.
The objective of IoT is to provide ubiquitous access to numerous devices and machines on …
The objective of IoT is to provide ubiquitous access to numerous devices and machines on …
Hybrid cryptographic approach to enhance the mode of key management system in cloud environment
S Ahmad, S Mehfuz, J Beg - The Journal of Supercomputing, 2023 - Springer
Cloud computing has gained great attention among the individual user and the organization.
Transitioning to the cloud platform is not simple as it involves various cybersecurity and …
Transitioning to the cloud platform is not simple as it involves various cybersecurity and …
Hybrid AES-ECC model for the security of data over cloud storage
A cloud computing environment provides a cost-effective way for the end user to store and
access private data over remote storage using some Internet connection. The user has …
access private data over remote storage using some Internet connection. The user has …
Enhanced cloud storage encryption standard for security in distributed environments
S Kautish, S Juneja, K Mohiuddin, FK Karim… - Electronics, 2023 - mdpi.com
With the growing number of cloud users, shared data auditing is becoming increasingly
important. However, these schemes have issues with the certificate management. Although …
important. However, these schemes have issues with the certificate management. Although …
Secure IoT framework for authentication and confidentiality using hybrid cryptographic schemes
IoTs are increasingly gaining popularity and prevalence due to their extensive applications
across various domains. They gather data from the real environment and transmit it through …
across various domains. They gather data from the real environment and transmit it through …
Block chain enabled auditing with optimal multi‐key homomorphic encryption technique for public cloud computing environment
VNR Bandaru, P Visalakshi - Concurrency and Computation …, 2022 - Wiley Online Library
Cloud storage is a significant cloud computing (CC) service which enables the client to save
and retrieve the data at anytime and anywhere. Due to the increased demand and familiarity …
and retrieve the data at anytime and anywhere. Due to the increased demand and familiarity …
Hybrid AES-Modified ECC Algorithm for Improved Data Security over Cloud Storage
S Jagadeesh, SM Ali, SPG Selvan… - … in Applied Sciences …, 2023 - semarakilmu.com.my
As cloud computing has been increasingly used by businesses to address their data storage
and processing needs. The private data can be stored and retrieved by the end user through …
and processing needs. The private data can be stored and retrieved by the end user through …
[PDF][PDF] The development of models of an analytical data processing system for monitoring information security of an informatization object using cloud infrastructure
VA Sizov, AD Kirov - Russian Technological Journal, 2021 - rtj-mirea.ru
The article is devoted to the problem of developing an analytical data processing system
(ADPS) for monitoring information security within the information security management …
(ADPS) for monitoring information security within the information security management …
RSA and Elliptic Curve Encryption System: A Systematic Literature Review
M Ugbedeojo, MO Adebiyi, OJ Aroba… - International Journal of …, 2024 - igi-global.com
Almost every living species has a motive to communicate electronically with one another
and preserve data for immediate or future use. These data are becoming too large to be …
and preserve data for immediate or future use. These data are becoming too large to be …