[HTML][HTML] The recent trends in cyber security: A review
J Kaur, KR Ramkumar - Journal of King Saud University-Computer and …, 2022 - Elsevier
During recent years, many researchers and professionals have revealed the endangerment
of wireless communication technologies and systems from various cyberattacks, these …
of wireless communication technologies and systems from various cyberattacks, these …
[HTML][HTML] Identity and access management in cloud environment: Mechanisms and challenges
Cloud computing is a complex system with combination of diverse networked devices that
supports demanded services. The architecture of cloud computing consists of different kinds …
supports demanded services. The architecture of cloud computing consists of different kinds …
Effective android malware detection with a hybrid model based on deep autoencoder and convolutional neural network
Android security incidents occurred frequently in recent years. To improve the accuracy and
efficiency of large-scale Android malware detection, in this work, we propose a hybrid model …
efficiency of large-scale Android malware detection, in this work, we propose a hybrid model …
Block-secure: Blockchain based scheme for secure P2P cloud storage
With the development of Internet technology, the volume of data is increasing tremendously.
To tackle with large-scale data, more and more applications choose to enlarge the storage …
To tackle with large-scale data, more and more applications choose to enlarge the storage …
Multi-server assisted data sharing supporting secure deduplication for metaverse healthcare systems
T Zhang, J Shen, CF Lai, S Ji, Y Ren - Future Generation Computer …, 2023 - Elsevier
The integration of Metaverse and healthcare will improve the allocation and utilization of
healthcare resources. Metaverse healthcare data is stored on a public server and …
healthcare resources. Metaverse healthcare data is stored on a public server and …
BMPLS: Blockchain-based multi-level privacy-preserving location sharing scheme for telecare medical information systems
Y Ji, J Zhang, J Ma, C Yang, X Yao - Journal of medical systems, 2018 - Springer
The sharing of patients' locations is an important part in mobile medical services and
modern smart healthcare. Although location sharing based on blockchains has advantages …
modern smart healthcare. Although location sharing based on blockchains has advantages …
Blockchain empowered cooperative authentication with data traceability in vehicular edge computing
The dynamic environment due to traffic mobility and wireless communication from/to
vehicles make identity authentication and trust management for privacy preservation based …
vehicles make identity authentication and trust management for privacy preservation based …
Designated-server identity-based authenticated encryption with keyword search for encrypted emails
In encrypted email system, how to search over encrypted cloud emails without decryption is
an important and practical problem. Public key encryption with keyword search (PEKS) is an …
an important and practical problem. Public key encryption with keyword search (PEKS) is an …
Reliable and privacy-preserving truth discovery for mobile crowdsensing systems
Truth discovery has received considerable attention in mobile crowdsensing systems. In real
practice, it is vital to resolve conflicts among a large amount of sensory data and estimate the …
practice, it is vital to resolve conflicts among a large amount of sensory data and estimate the …
A secure and efficient data sharing scheme based on blockchain in industrial Internet of Things
Blockchain possesses potential for enabling secure data sharing of industrial big data
generated by the Industrial Internet of Things (IIoT). However, the existing data-sharing …
generated by the Industrial Internet of Things (IIoT). However, the existing data-sharing …