A perfect security key management method for hierarchical wireless sensor networks in medical environments

RA Muhajjar, NA Flayh, M Al-Zubaidie - Electronics, 2023 - mdpi.com
Wireless sensor networks (WSNs) have developed during the past twenty years as a result
of the accessibility of inexpensive, short-range, and simple-to-deploy sensors. A WSN …

A novel cancelable fingerprint scheme based on random security sampling mechanism and relocation bloom filter

Y Sun, H Li, N Li - Computers & Security, 2023 - Elsevier
The existing cancellable fingerprint template based on the bloom filter either suffers from a
lack of template security or low recognition performance. To solve the above problems, the …

Hunting the pertinency of bloom filter in computer networking and beyond: A survey

R Patgiri, S Nayak, SK Borgohain - Journal of Computer …, 2019 - Wiley Online Library
Bloom filter is a probabilistic data structure to filter a membership of a set. Bloom filter returns
“true” or “false” with an error tolerance depending on the presence of the element in the set …

Adaptive weighted graph approach to generate multimodal cancelable biometric templates

GS Walia, G Jain, N Bansal… - IEEE transactions on …, 2019 - ieeexplore.ieee.org
Multimodal biometric systems offer numerous advantages over unimodal counterparts and
are being used extensively in diverse applications. However, fusion of biometric data is a …

A survey on the roles of bloom filter in implementation of the named data networking

S Nayak, R Patgiri, A Borah - Computer Networks, 2021 - Elsevier
Today is the era of smart devices. Through smart devices, people remain connected with
each other across the globe. But, it led the current Internet towards scalability issues …

[图书][B] Online social networks security: principles, algorithm, applications, and perspectives

BB Gupta, SR Sahoo - 2021 - taylorfrancis.com
In recent years, virtual meeting technology has become a part of the everyday lives of more
and more people, often with the help of global online social networks (OSNs). These help …

Palmprint template protection scheme based on randomized cuckoo hashing and MinHash

H Li, J Qiu, ABJ Teoh - Multimedia Tools and Applications, 2020 - Springer
To provide the necessary security and privacy privileges for registered users of biometric
systems, a novel template protection method for generating cancelable palmprint features …

Cancelable palmprint templates based on random measurement and noise data for security and privacy-preserving authentication

J Qiu, H Li, C Zhao - Computers & Security, 2019 - Elsevier
In order to achieve biometric security and enhance privacy-preserving, a novel palmprint
template protection scheme based on random comparison and noise data is proposed …

DCDPI: Dynamic and Continuous Deep Packet Inspection in Secure Outsourced Middleboxes

M Deng, K Zhang, P Wu, M Wen… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
Secure outsourced middleboxes are deployed in network function virtualization services that
detect malicious activities on communications, which provides privacy-preserving deep …

[图书][B] A beginner's guide to Internet of Things security: Attacks, applications, authentication, and fundamentals

BB Gupta, A Tewari - 2020 - taylorfrancis.com
A Beginner's Guide to Internet of Things Security focuses on security issues and
developments in the Internet of Things (IoT) environment. The wide-ranging applications of …