Cyber-physical systems security: Limitations, issues and future trends

JPA Yaacoub, O Salman, HN Noura… - Microprocessors and …, 2020 - Elsevier
Abstract Typically, Cyber-Physical Systems (CPS) involve various interconnected systems,
which can monitor and manipulate real objects and processes. They are closely related to …

New image encryption algorithm using hyperchaotic system and fibonacci q-matrix

KM Hosny, ST Kamal, MM Darwish, GA Papakostas - Electronics, 2021 - mdpi.com
In the age of Information Technology, the day-life required transmitting millions of images
between users. Securing these images is essential. Digital image encryption is a well-known …

A location-based privacy-preserving oblivious sharing scheme for indoor navigation

H Yang, P Vijayakumar, J Shen, BB Gupta - Future Generation Computer …, 2022 - Elsevier
In recent years, with the rapid development of wireless communication technology and
mobile devices, etc., indoor localization and navigation using WiFi sensing are increasingly …

Searchable and secure edge pre-cache scheme for intelligent 6G wireless systems

C Wang, T Zhou, J Shen, W Wang, X Zhou - Future Generation Computer …, 2023 - Elsevier
Driven by artificial intelligence and network communication technology, intelligent 6G
wireless systems have gradually become an important environment for users to enjoy data …

Securing the cyber-physical system: A review

M Lydia, GE Prem Kumar… - Cyber-Physical Systems, 2023 - Taylor & Francis
ABSTRACT The Cyber-Physical System (CPS) is poised to have a revolutionary impact on
almost every area of our lives including transportation, healthcare, energy, automation and …

Collaborative filtering-based recommendation system for big data

J Shen, T Zhou, L Chen - International Journal of …, 2020 - inderscienceonline.com
Collaborative filtering algorithm is widely used in the recommendation system of e-
commerce website, which is based on the analysis of a large number of users' historical …

Practical homomorphic authentication in cloud-assisted vanets with blockchain-based healthcare monitoring for pandemic control

H Tan, P Kim, I Chung - Electronics, 2020 - mdpi.com
Currently, the outbreak of COVID-19 pandemic has caused catastrophic effect on every
aspect of our lives, globally. The entire human race of all countries and regions has suffered …

An adaptive access control scheme based on trust degrees for edge computing

W Zheng, B Chen, D He - Computer Standards & Interfaces, 2022 - Elsevier
Access control is an essential mechanism in collaborative environments, which guarantees
the security of shared resources. With the intertwinement of emerging technologies likes …

[HTML][HTML] Onboard disease prediction and rehabilitation monitoring on secure edge-cloud integrated privacy preserving healthcare system

R Jayaram, S Prabakaran - Egyptian Informatics Journal, 2021 - Elsevier
Edge-based privacy preserving cryptosystem is identified as the upcoming amenities of
cloud-based secure remote healthcare monitoring systems. Usually, the cloud-based …

Cancelable biometric authentication system based on hyperchaotic technique and fibonacci Q-Matrix

FA Hossam Eldein Mohamed, W El-Shafai - Multimedia Tools and …, 2024 - Springer
Due to the rapid growth in the field of information transmission techniques, billions of data
are transmitted through variant authentication applications between clients. Providing …