[HTML][HTML] Federated learning for secure IoMT-applications in smart healthcare systems: A comprehensive review
Recent developments in the Internet of Things (IoT) and various communication
technologies have reshaped numerous application areas. Nowadays, IoT is assimilated into …
technologies have reshaped numerous application areas. Nowadays, IoT is assimilated into …
Authentication protocols in internet of vehicles: Taxonomy, analysis, and challenges
Internet of Vehicles (IoV) is treated as an extension of Vehicle-to-Vehicle (V2V)
communication network. IoV helps in enhancing driving aids with the help of vehicle Artificial …
communication network. IoV helps in enhancing driving aids with the help of vehicle Artificial …
Smart contract-based blockchain-envisioned authentication scheme for smart farming
A blockchain-based smart farming technology provides the agricultural data to the farmers
and other users associated with smart farming on a single integrated platform. Moreover …
and other users associated with smart farming on a single integrated platform. Moreover …
Designing secure blockchain-based access control scheme in IoT-enabled Internet of Drones deployment
In recent years, the Internet of Drones (IoD) has emerged as an important research topic in
the academy and industry because it has several potential applications ranging from the …
the academy and industry because it has several potential applications ranging from the …
Blockchain-envisioned secure data delivery and collection scheme for 5g-based iot-enabled internet of drones environment
The Internet of Drones (IoD) is widely used in a wide range of applications from military to
civilian applications from the past years. However, during communication either with the …
civilian applications from the past years. However, during communication either with the …
Cloud-aided lightweight certificateless authentication protocol with anonymity for wireless body area networks
With the development of cloud computing and wireless body area networks (WBANs),
wearable equipments are able to become new intelligent terminals to provide services for …
wearable equipments are able to become new intelligent terminals to provide services for …
[图书][B] Understanding cryptography
This is the second edition of Understanding Cryptography. Ever since we released the first
edition in 2009, we have been humbled by the many positive responses we received from …
edition in 2009, we have been humbled by the many positive responses we received from …
Security and privacy preservation scheme of face identification and resolution framework using fog computing in internet of things
Face identification and resolution technology is crucial to ensure the identity consistency of
humans in physical space and cyber space. In the current Internet of Things (IoT) and big …
humans in physical space and cyber space. In the current Internet of Things (IoT) and big …
[图书][B] Cryptography: theory and practice
DR Stinson - 2005 - api.taylorfrancis.com
THE LEGACYFirst introduced in 1995, Cryptography: Theory and Practice garnered
enormous praise and popularity, and soon became the standard textbook for cryptography …
enormous praise and popularity, and soon became the standard textbook for cryptography …
A secure three-factor user authentication protocol with forward secrecy for wireless medical sensor network systems
The Internet of Things (IoT) enables all objects to connect to the Internet and exchange data
via different emerging technologies, which makes the intelligent identification and …
via different emerging technologies, which makes the intelligent identification and …