A perfect security key management method for hierarchical wireless sensor networks in medical environments
RA Muhajjar, NA Flayh, M Al-Zubaidie - Electronics, 2023 - mdpi.com
Wireless sensor networks (WSNs) have developed during the past twenty years as a result
of the accessibility of inexpensive, short-range, and simple-to-deploy sensors. A WSN …
of the accessibility of inexpensive, short-range, and simple-to-deploy sensors. A WSN …
A novel cancelable fingerprint scheme based on random security sampling mechanism and relocation bloom filter
Y Sun, H Li, N Li - Computers & Security, 2023 - Elsevier
The existing cancellable fingerprint template based on the bloom filter either suffers from a
lack of template security or low recognition performance. To solve the above problems, the …
lack of template security or low recognition performance. To solve the above problems, the …
Hunting the pertinency of bloom filter in computer networking and beyond: A survey
Bloom filter is a probabilistic data structure to filter a membership of a set. Bloom filter returns
“true” or “false” with an error tolerance depending on the presence of the element in the set …
“true” or “false” with an error tolerance depending on the presence of the element in the set …
Adaptive weighted graph approach to generate multimodal cancelable biometric templates
GS Walia, G Jain, N Bansal… - IEEE transactions on …, 2019 - ieeexplore.ieee.org
Multimodal biometric systems offer numerous advantages over unimodal counterparts and
are being used extensively in diverse applications. However, fusion of biometric data is a …
are being used extensively in diverse applications. However, fusion of biometric data is a …
A survey on the roles of bloom filter in implementation of the named data networking
Today is the era of smart devices. Through smart devices, people remain connected with
each other across the globe. But, it led the current Internet towards scalability issues …
each other across the globe. But, it led the current Internet towards scalability issues …
[图书][B] Online social networks security: principles, algorithm, applications, and perspectives
BB Gupta, SR Sahoo - 2021 - taylorfrancis.com
In recent years, virtual meeting technology has become a part of the everyday lives of more
and more people, often with the help of global online social networks (OSNs). These help …
and more people, often with the help of global online social networks (OSNs). These help …
Palmprint template protection scheme based on randomized cuckoo hashing and MinHash
To provide the necessary security and privacy privileges for registered users of biometric
systems, a novel template protection method for generating cancelable palmprint features …
systems, a novel template protection method for generating cancelable palmprint features …
Cancelable palmprint templates based on random measurement and noise data for security and privacy-preserving authentication
In order to achieve biometric security and enhance privacy-preserving, a novel palmprint
template protection scheme based on random comparison and noise data is proposed …
template protection scheme based on random comparison and noise data is proposed …
DCDPI: Dynamic and Continuous Deep Packet Inspection in Secure Outsourced Middleboxes
Secure outsourced middleboxes are deployed in network function virtualization services that
detect malicious activities on communications, which provides privacy-preserving deep …
detect malicious activities on communications, which provides privacy-preserving deep …
[图书][B] A beginner's guide to Internet of Things security: Attacks, applications, authentication, and fundamentals
BB Gupta, A Tewari - 2020 - taylorfrancis.com
A Beginner's Guide to Internet of Things Security focuses on security issues and
developments in the Internet of Things (IoT) environment. The wide-ranging applications of …
developments in the Internet of Things (IoT) environment. The wide-ranging applications of …