Enabling unmanned aerial vehicle borne secure communication with classification framework for industry 5.0

DK Jain, Y Li, MJ Er, Q Xin, D Gupta… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
The fifth industrial revolution (Industry 5.0) integrates humans and machines to satisfy the
increasing customization demands of the manufacturing complexity using an optimized …

Homomorphic Encryption Applications for IoT and Light-Weighted Environments: A Review

S Ullah, JLJ Chen, I Ali, S Khan… - IEEE Internet of …, 2024 - ieeexplore.ieee.org
Homomorphic encryption (HE) is one of the more sophisticated methods of homomorphic
cryptography (HC). HC efficiently contacts the interacting parties in open IoT and light …

Improved privacy preservation framework for cloud-based internet of things

N Yuvaraj, RA Raja, T Karthikeyan, NV Kousik - Internet of things, 2020 - taylorfrancis.com
The vast generation of data via Internet of Things (IoTs) technology has to be secured
efficiently without compromising the quality of service (QoS). The presence of data …

[PDF][PDF] Secure storage of lung brain multi-modal medical images using DNA homomorphic encryption

SG Sophia, KK Thanammal, SS Sujatha - International Journal of …, 2023 - kitspress.com
Protecting the medical data on the online platform for transmitting data is a simple and
demanding task. In the modern world, various methods are used to safeguard the digital …

Blind signcryption scheme based on hyper elliptic curves cryptosystem

S Ullah, N Din - Peer-to-Peer Networking and Applications, 2021 - Springer
In modern cryptography, the Discrete Logarithm Problem (DLP) plays a vital role, but a
classical computer cannot efficiently solve it. Nowadays, the Hyper Elliptic Curve Discrete …

Secure medical data on cloud storage via DNA homomorphic encryption technique

Q Liu, F Zhou, H Chen - Physical Communication, 2024 - Elsevier
Background Cloud computing offers considerable flexibility and financial savings to data
owners for outsourcing their complicated data management systems from local sites to the …

Approaching the Information-Theoretic Limit of Privacy Disclosure with Utility Guarantees

Q Yang, C Wang, H Yuan, J Cui, H Teng… - IEEE Transactions …, 2024 - ieeexplore.ieee.org
The possibility for public attributes to disclose private information has caused widespread
concern. Traditional privacy-preserving approaches have two limitations: 1) Approaches …

Homomorphic Encryption for Privacy Preservation in Occupancy Sensor-Based Smart Lighting

AG Putrada, M Abdurohman… - … Conference on Data …, 2024 - ieeexplore.ieee.org
Occupancy sensor-based smart lighting is very practical because the light status can change
automatically according to human activity under the lighting area. However, on the other …

Implicit privacy preservation: a framework based on data generation

Q Yang, C Wang, T Hu, X Chen… - Security and Safety, 2022 - sands.edpsciences.org
This paper addresses a special and imperceptible class of privacy, called implicit privacy. In
contrast to traditional (explicit) privacy, implicit privacy has two essential properties:(1) It is …

Evaluating Cloud Security Performance for Medical Data Based on Spider Monkey Paillier Homomorphic Cryptosystem

D Kalpana, K Ram Mohan Rao - International Conference on Computing …, 2023 - Springer
Data sharing is made easy by cloud computing, but data security is a major problem
because of online threats. For patient privacy and to guarantee data security, protecting …