[HTML][HTML] Privacy-preserving data mining on blockchain-based wsns
Currently, the computational power present in the sensors forming a wireless sensor
network (WSN) allows for implementing most of the data processing and analysis directly on …
network (WSN) allows for implementing most of the data processing and analysis directly on …
A general purpose data and query privacy preserving protocol for wireless sensor networks
The large number of devices characterizing Wireless Sensor Networks (WSNs) provide the
benefits of observing, tracking, and recording everything; nonetheless, the cumulative …
benefits of observing, tracking, and recording everything; nonetheless, the cumulative …
[HTML][HTML] A WSN framework for privacy aware indoor location
In the past two decades, technological advancements in smart devices, IoT, and smart
sensors have paved the way towards numerous implementations of indoor location systems …
sensors have paved the way towards numerous implementations of indoor location systems …
[HTML][HTML] Efficient implementation of the linear layer of block ciphers with large MDS matrices based on a new lookup table technique
TT Luong, N Van Long, B Vo - PLOS ONE, 2024 - journals.plos.org
Block cipher is a cryptographic field that is now widely applied in various domains. Besides
its security, deployment issues, implementation costs, and flexibility across different …
its security, deployment issues, implementation costs, and flexibility across different …
[HTML][HTML] Privacy-aware and secure decentralized air quality monitoring
Indoor Air Quality monitoring is a major asset to improving quality of life and building
management. Today, the evolution of embedded technologies allows the implementation of …
management. Today, the evolution of embedded technologies allows the implementation of …
Semantically-Driven Secure Task Execution over Wireless Sensor Networks
The growing adoption of low-cost sensors is raising valid concerns with regards to data,
user, computation, and network privacy. In this paper we propose a semantically-driven …
user, computation, and network privacy. In this paper we propose a semantically-driven …