Blockchain for large-scale internet of things data storage and protection
With the dramatically increasing deployment of IoT devices, storing and protecting the large
volume of IoT data has become a significant issue. Traditional cloud-based IoT structures …
volume of IoT data has become a significant issue. Traditional cloud-based IoT structures …
[HTML][HTML] Attributes impacting cybersecurity policy development: An evidence from seven nations
Cyber threats have risen as a result of the growing usage of the Internet. Organizations must
have effective cybersecurity policies in place to respond to escalating cyber threats …
have effective cybersecurity policies in place to respond to escalating cyber threats …
A comprehensive survey of cryptography key management systems
Cryptographic methods have been extensively employed in various systems to address
security objectives, such as data confidentiality, authentication, and secure communication …
security objectives, such as data confidentiality, authentication, and secure communication …
Elliptic curve lightweight cryptography: A survey
CA Lara-Nino, A Diaz-Perez… - IEEE Access, 2018 - ieeexplore.ieee.org
Since it was invented in 1986, elliptic curve cryptography (ECC) has been studied widely in
industry and academy from different perspectives. Some of these aspects include …
industry and academy from different perspectives. Some of these aspects include …
Aot: Authentication and access control for the entire iot device life-cycle
The consumer electronics industry is witnessing a surge in Internet of Things (IoT) devices,
ranging from mundane artifacts to complex biosensors connected across disparate …
ranging from mundane artifacts to complex biosensors connected across disparate …
[PDF][PDF] Preventing multiple accessing attacks via efficient integration of captcha crypto hash functions
N Kheshaifaty, A Gutub - Int. J. Comput. Sci. Netw. Secur.(IJCSNS), 2020 - researchgate.net
Authentication is the process of verifying the identity of online computer users. It can be
confirmed using various methods such as captchas or encrypted hashed passwords to …
confirmed using various methods such as captchas or encrypted hashed passwords to …
A scalable attribute-based access control scheme with flexible delegation cum sharing of access privileges for cloud storage
R Ahuja, SK Mohanty - IEEE Transactions on Cloud Computing, 2017 - ieeexplore.ieee.org
Nowadays cloud servers have become the primary choice to store and share data with
multiple users across the globe. The major challenge in sharing data using cloud servers is …
multiple users across the globe. The major challenge in sharing data using cloud servers is …
An IBE-based design for assured deletion in cloud storage
A Bentajer, M Hedabou, K Abouelmehdi, Z Igarramen… - Cryptologia, 2019 - Taylor & Francis
Assured deletion of outsourced data in cloud storage is one of the most important issues in
cloud storage. The use of encryption is a promising approach to address this issue. In this …
cloud storage. The use of encryption is a promising approach to address this issue. In this …
CS-IBE: a data confidentiality system in public cloud storage system
A Bentajer, M Hedabou, K Abouelmehdi… - Procedia computer …, 2018 - Elsevier
In public cloud storage systems, the confidentiality of sensitive data remains the most
important issue. Cryptography is a promising approach for addressing this issue. In this …
important issue. Cryptography is a promising approach for addressing this issue. In this …
Cross-layer encryption of CFB-AES-TURBO for advanced satellite data transmission security
As the advanced satellite network can provide extremely diverse data to various types of
users, it is of vital importance to achieve data security using encryption over satellite …
users, it is of vital importance to achieve data security using encryption over satellite …