Privacy-preserving cloud computing on sensitive data: A survey of methods, products and challenges

J Domingo-Ferrer, O Farras, J Ribes-González… - Computer …, 2019 - Elsevier
The increasing volume of personal and sensitive data being harvested by data controllers
makes it increasingly necessary to use the cloud not just to store the data, but also to …

Cryptographic approaches to authenticating synthetic DNA sequences

CT Berezin, S Peccoud, DM Kar, J Peccoud - Trends in Biotechnology, 2024 - cell.com
In a bioeconomy that relies on synthetic DNA sequences, the ability to ensure their
authenticity is critical. DNA watermarks can encode identifying data in short sequences and …

Security of satellite-terrestrial communications: Challenges and potential solutions

I Ahmad, J Suomalainen, P Porambage, A Gurtov… - IEEE …, 2022 - ieeexplore.ieee.org
The integration of satellite and terrestrial networks has become inevitable in the next
generations of communications networks due to emerging needs of ubiquitous connectivity …

Strengthen cloud computing security with federal identity management using hierarchical identity-based cryptography

L Yan, C Rong, G Zhao - … , CloudCom 2009, Beijing, China, December 1-4 …, 2009 - Springer
More and more companies begin to provide different kinds of cloud computing services for
Internet users at the same time these services also bring some security problems. Currently …

Lightweight encryption for smart home

S Al Salami, J Baek, K Salah… - 2016 11th International …, 2016 - ieeexplore.ieee.org
Smart home is one of the most popular IoT (Internet of Things) applications, which connects
a wide variety of objects and home appliances in a single logical network. Smart home …

Multi-user broadcast authentication in wireless sensor networks

K Ren, S Yu, W Lou, Y Zhang - IEEE Transactions on Vehicular …, 2009 - ieeexplore.ieee.org
Broadcast authentication is a critical security service in wireless sensor networks (WSNs), as
it allows mobile users of WSNs to broadcast messages to multiple sensor nodes in a secure …

On broadcast authentication in wireless sensor networks

K Ren, W Lou, K Zeng, PJ Moran - IEEE Transactions on …, 2007 - ieeexplore.ieee.org
Broadcast authentication is a critical security service in wireless sensor networks (WSNs),
since it enables users to broadcast the WSN in an authenticated way. Symmetric key based …

Privacy-preserving aware data transmission for IoT-based e-health

R Boussada, B Hamdane, ME Elhdhili, LA Saidane - Computer Networks, 2019 - Elsevier
Abstract Internet of Things (IoT) is an emerging networking paradigm that aims to improve
human daily life. It includes a huge number of interactive nodes that generate, aggregate …

Towards a reputation-based routing protocol to contrast blackholes in a delay tolerant network

G Dini, AL Duca - Ad Hoc Networks, 2012 - Elsevier
A Delay Tolerant Network (DTN) relies on the implicit assumption that nodes cooperate
towards message forwarding. However, this assumption cannot be satisfied when there are …

Software platforms for internet of things and M2M

P Balamuralidhara, P Misra, A Pal - Journal of the Indian Institute of …, 2013 - journal.iisc.ac.in
REVIEWS Page 1 Journal of the Indian Institute of Science A Multidisciplinary Reviews Journal
ISSN: 0970-4140 Coden-JIISAD © Indian Institute of Science Journal of the Indian Institute of …