Cyber-physical systems security: Limitations, issues and future trends
Abstract Typically, Cyber-Physical Systems (CPS) involve various interconnected systems,
which can monitor and manipulate real objects and processes. They are closely related to …
which can monitor and manipulate real objects and processes. They are closely related to …
New image encryption algorithm using hyperchaotic system and fibonacci q-matrix
In the age of Information Technology, the day-life required transmitting millions of images
between users. Securing these images is essential. Digital image encryption is a well-known …
between users. Securing these images is essential. Digital image encryption is a well-known …
A location-based privacy-preserving oblivious sharing scheme for indoor navigation
H Yang, P Vijayakumar, J Shen, BB Gupta - Future Generation Computer …, 2022 - Elsevier
In recent years, with the rapid development of wireless communication technology and
mobile devices, etc., indoor localization and navigation using WiFi sensing are increasingly …
mobile devices, etc., indoor localization and navigation using WiFi sensing are increasingly …
Searchable and secure edge pre-cache scheme for intelligent 6G wireless systems
Driven by artificial intelligence and network communication technology, intelligent 6G
wireless systems have gradually become an important environment for users to enjoy data …
wireless systems have gradually become an important environment for users to enjoy data …
Securing the cyber-physical system: A review
M Lydia, GE Prem Kumar… - Cyber-Physical Systems, 2023 - Taylor & Francis
ABSTRACT The Cyber-Physical System (CPS) is poised to have a revolutionary impact on
almost every area of our lives including transportation, healthcare, energy, automation and …
almost every area of our lives including transportation, healthcare, energy, automation and …
Collaborative filtering-based recommendation system for big data
Collaborative filtering algorithm is widely used in the recommendation system of e-
commerce website, which is based on the analysis of a large number of users' historical …
commerce website, which is based on the analysis of a large number of users' historical …
Practical homomorphic authentication in cloud-assisted vanets with blockchain-based healthcare monitoring for pandemic control
Currently, the outbreak of COVID-19 pandemic has caused catastrophic effect on every
aspect of our lives, globally. The entire human race of all countries and regions has suffered …
aspect of our lives, globally. The entire human race of all countries and regions has suffered …
An adaptive access control scheme based on trust degrees for edge computing
Access control is an essential mechanism in collaborative environments, which guarantees
the security of shared resources. With the intertwinement of emerging technologies likes …
the security of shared resources. With the intertwinement of emerging technologies likes …
[HTML][HTML] Onboard disease prediction and rehabilitation monitoring on secure edge-cloud integrated privacy preserving healthcare system
R Jayaram, S Prabakaran - Egyptian Informatics Journal, 2021 - Elsevier
Edge-based privacy preserving cryptosystem is identified as the upcoming amenities of
cloud-based secure remote healthcare monitoring systems. Usually, the cloud-based …
cloud-based secure remote healthcare monitoring systems. Usually, the cloud-based …
Cancelable biometric authentication system based on hyperchaotic technique and fibonacci Q-Matrix
FA Hossam Eldein Mohamed, W El-Shafai - Multimedia Tools and …, 2024 - Springer
Due to the rapid growth in the field of information transmission techniques, billions of data
are transmitted through variant authentication applications between clients. Providing …
are transmitted through variant authentication applications between clients. Providing …