[HTML][HTML] Security and privacy in IoT-cloud-based e-health systems—A comprehensive review
When the Internet and other interconnected networks are used in a health system, it is
referred to as “e-Health.” In this paper, we examined research studies from 2017–2020 to …
referred to as “e-Health.” In this paper, we examined research studies from 2017–2020 to …
Systematic survey of mobile payments, protocols, and security infrastructure
Mobile payments makeup one of the fastest-growing mobile services available today and
are widely used by smartphones for utility payments, bill payments, and online shopping …
are widely used by smartphones for utility payments, bill payments, and online shopping …
Hashed Needham Schroeder industrial IoT based cost optimized deep secured data transmission in cloud
Deep learning is an encouraging approach for extracting precise information from raw
sensor data from IoT devices. In this paper, Hashed Needham Schroeder (HNS) Cost …
sensor data from IoT devices. In this paper, Hashed Needham Schroeder (HNS) Cost …
Discovering IoT implications in business and management: A computational thematic analysis
MS Delgosha, N Hajiheydari, M Talafidaryani - Technovation, 2022 - Elsevier
IoT as a disruptive technology is contributing toward ground-breaking experiences in
contemporary enterprises and in our daily life. Rapidly changing business environment and …
contemporary enterprises and in our daily life. Rapidly changing business environment and …
Mscryptonet: Multi-scheme privacy-preserving deep learning in cloud computing
OA Kwabena, Z Qin, T Zhuang, Z Qin - IEEE Access, 2019 - ieeexplore.ieee.org
Privacy in the Internet of Things is a fundamental challenge for the Ubiquitous healthcare
systems that depend on the data aggregated and collaborative deep learning among …
systems that depend on the data aggregated and collaborative deep learning among …
Efficient and provably secure certificateless parallel key-insulated signature without pairing for IIoT environments
With the continuous development of the industrial Internet of Things (IIoT), many
organizations opt for storing the data collected by smart devices on a cloud server for saving …
organizations opt for storing the data collected by smart devices on a cloud server for saving …
A secure and authenticated mobile payment protocol against off-site attack strategy
Mobile payment system has been expected to provide more efficient and convenient
payment methods. However, compared to traditional payments, mobile payment issues …
payment methods. However, compared to traditional payments, mobile payment issues …
Improved secure transaction scheme with certificateless cryptographic primitives for IoT-based mobile payments
Z Qiao, Q Yang, Y Zhou, M Zhang - IEEE Systems Journal, 2021 - ieeexplore.ieee.org
To achieve security of mobile payments within insecure public communication networks, in
2018, a secure transaction scheme for mobile payments is constructed by Yeh from a …
2018, a secure transaction scheme for mobile payments is constructed by Yeh from a …
Applying transaction cost theory and push-pull-mooring model to investigate mobile payment switching behaviors with well-established traditional financial …
HP Lu, YS Wung - Journal of theoretical and applied electronic commerce …, 2021 - mdpi.com
The technology of mobile payments has received more attention than ever. However,
whether it is possible that mobile payment will become a common payment method for …
whether it is possible that mobile payment will become a common payment method for …
[HTML][HTML] Role of authentication factors in Fin-tech mobile transaction security
Fin-Tech is the merging of finance and technology, to be considered a key term for
technology-based financial operations and money transactions as far as Fin-Tech is …
technology-based financial operations and money transactions as far as Fin-Tech is …