Privacy-preserving cloud computing on sensitive data: A survey of methods, products and challenges
J Domingo-Ferrer, O Farras, J Ribes-González… - Computer …, 2019 - Elsevier
The increasing volume of personal and sensitive data being harvested by data controllers
makes it increasingly necessary to use the cloud not just to store the data, but also to …
makes it increasingly necessary to use the cloud not just to store the data, but also to …
Cryptographic approaches to authenticating synthetic DNA sequences
In a bioeconomy that relies on synthetic DNA sequences, the ability to ensure their
authenticity is critical. DNA watermarks can encode identifying data in short sequences and …
authenticity is critical. DNA watermarks can encode identifying data in short sequences and …
Security of satellite-terrestrial communications: Challenges and potential solutions
The integration of satellite and terrestrial networks has become inevitable in the next
generations of communications networks due to emerging needs of ubiquitous connectivity …
generations of communications networks due to emerging needs of ubiquitous connectivity …
Strengthen cloud computing security with federal identity management using hierarchical identity-based cryptography
More and more companies begin to provide different kinds of cloud computing services for
Internet users at the same time these services also bring some security problems. Currently …
Internet users at the same time these services also bring some security problems. Currently …
Lightweight encryption for smart home
Smart home is one of the most popular IoT (Internet of Things) applications, which connects
a wide variety of objects and home appliances in a single logical network. Smart home …
a wide variety of objects and home appliances in a single logical network. Smart home …
Multi-user broadcast authentication in wireless sensor networks
Broadcast authentication is a critical security service in wireless sensor networks (WSNs), as
it allows mobile users of WSNs to broadcast messages to multiple sensor nodes in a secure …
it allows mobile users of WSNs to broadcast messages to multiple sensor nodes in a secure …
On broadcast authentication in wireless sensor networks
Broadcast authentication is a critical security service in wireless sensor networks (WSNs),
since it enables users to broadcast the WSN in an authenticated way. Symmetric key based …
since it enables users to broadcast the WSN in an authenticated way. Symmetric key based …
Privacy-preserving aware data transmission for IoT-based e-health
R Boussada, B Hamdane, ME Elhdhili, LA Saidane - Computer Networks, 2019 - Elsevier
Abstract Internet of Things (IoT) is an emerging networking paradigm that aims to improve
human daily life. It includes a huge number of interactive nodes that generate, aggregate …
human daily life. It includes a huge number of interactive nodes that generate, aggregate …
Towards a reputation-based routing protocol to contrast blackholes in a delay tolerant network
A Delay Tolerant Network (DTN) relies on the implicit assumption that nodes cooperate
towards message forwarding. However, this assumption cannot be satisfied when there are …
towards message forwarding. However, this assumption cannot be satisfied when there are …
Software platforms for internet of things and M2M
REVIEWS Page 1 Journal of the Indian Institute of Science A Multidisciplinary Reviews Journal
ISSN: 0970-4140 Coden-JIISAD © Indian Institute of Science Journal of the Indian Institute of …
ISSN: 0970-4140 Coden-JIISAD © Indian Institute of Science Journal of the Indian Institute of …