[HTML][HTML] The recent trends in cyber security: A review

J Kaur, KR Ramkumar - Journal of King Saud University-Computer and …, 2022 - Elsevier
During recent years, many researchers and professionals have revealed the endangerment
of wireless communication technologies and systems from various cyberattacks, these …

[HTML][HTML] Identity and access management in cloud environment: Mechanisms and challenges

I Indu, PMR Anand, V Bhaskar - Engineering science and technology, an …, 2018 - Elsevier
Cloud computing is a complex system with combination of diverse networked devices that
supports demanded services. The architecture of cloud computing consists of different kinds …

Effective android malware detection with a hybrid model based on deep autoencoder and convolutional neural network

W Wang, M Zhao, J Wang - Journal of Ambient Intelligence and …, 2019 - Springer
Android security incidents occurred frequently in recent years. To improve the accuracy and
efficiency of large-scale Android malware detection, in this work, we propose a hybrid model …

Block-secure: Blockchain based scheme for secure P2P cloud storage

J Li, J Wu, L Chen - Information Sciences, 2018 - Elsevier
With the development of Internet technology, the volume of data is increasing tremendously.
To tackle with large-scale data, more and more applications choose to enlarge the storage …

Multi-server assisted data sharing supporting secure deduplication for metaverse healthcare systems

T Zhang, J Shen, CF Lai, S Ji, Y Ren - Future Generation Computer …, 2023 - Elsevier
The integration of Metaverse and healthcare will improve the allocation and utilization of
healthcare resources. Metaverse healthcare data is stored on a public server and …

BMPLS: Blockchain-based multi-level privacy-preserving location sharing scheme for telecare medical information systems

Y Ji, J Zhang, J Ma, C Yang, X Yao - Journal of medical systems, 2018 - Springer
The sharing of patients' locations is an important part in mobile medical services and
modern smart healthcare. Although location sharing based on blockchains has advantages …

Blockchain empowered cooperative authentication with data traceability in vehicular edge computing

H Liu, P Zhang, G Pu, T Yang… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
The dynamic environment due to traffic mobility and wireless communication from/to
vehicles make identity authentication and trust management for privacy preservation based …

Designated-server identity-based authenticated encryption with keyword search for encrypted emails

H Li, Q Huang, J Shen, G Yang, W Susilo - Information Sciences, 2019 - Elsevier
In encrypted email system, how to search over encrypted cloud emails without decryption is
an important and practical problem. Public key encryption with keyword search (PEKS) is an …

Reliable and privacy-preserving truth discovery for mobile crowdsensing systems

C Zhang, L Zhu, C Xu, X Liu… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
Truth discovery has received considerable attention in mobile crowdsensing systems. In real
practice, it is vital to resolve conflicts among a large amount of sensory data and estimate the …

A secure and efficient data sharing scheme based on blockchain in industrial Internet of Things

J Chi, Y Li, J Huang, J Liu, Y Jin, C Chen… - Journal of Network and …, 2020 - Elsevier
Blockchain possesses potential for enabling secure data sharing of industrial big data
generated by the Industrial Internet of Things (IIoT). However, the existing data-sharing …