Security of federated learning in 6G era: A review on conceptual techniques and software platforms used for research and analysis

SHA Kazmi, F Qamar, R Hassan, K Nisar… - Computer Networks, 2024 - Elsevier
Federated Learning (FL) is an emerging Artificial Intelligence (AI) paradigm enabling
multiple parties to train a model collaboratively without sharing their data. With the upcoming …

A privacy-preserving zero-knowledge proof for blockchain

PW Chi, YH Lu, A Guan - Ieee Access, 2023 - ieeexplore.ieee.org
Zero-Knowledge Proof (ZKP) is a useful tools for proving that a prover possesses a secret
without revealing it to the verifier. Designated Verifier Proof (DVP) is a special type of ZKP …

Security in Federated Learning Enabled 6g Era: A Review on Conceptual Techniques and Software Platforms Used for Research and Analysis

SHA Kazmi, F Qamar, R Hassan, K Nisar… - Available at SSRN …, 2024 - papers.ssrn.com
Federated Learning (FL) is an emerging Artificial Intelligence (AI) paradigm that enables
multiple parties to collaboratively train a model without sharing their data. With the upcoming …

Security-enhanced SDN controller based Kerberos authentication protocol

H Mutaher, P Kumar - … on Cloud Computing, Data Science & …, 2021 - ieeexplore.ieee.org
Scalability is one of the effective features of the Software Defined Network (SDN) that allows
several devices to communicate with each other. In SDN scalable networks, the number of …

Research on 5G-oriented SDN architecture

B Zhang, B Zhuge, Y Shao, Y Zhu - 2022 2nd International …, 2022 - ieeexplore.ieee.org
With the rapid development of information technology and electronic science and
technology, all kinds of terminal products are widely used in the daily life of the public …

A driven modern portfolio theory for virtual network embedding in SDN-enabled cloud

A Bouchair, B Yagoubi, SA Makhlouf - Scalable Computing: Practice and …, 2022 - scpe.org
Network virtualization (NV) has evolved systematically through the urge to share computing
resources and improve service deployment in a large-scale environment. Virtual network …

Secure Host Login Technique based Key Agreement protocol for Software Defined Network

A Bhardwaj, H Mutaher - 2022 4th International Conference on …, 2022 - ieeexplore.ieee.org
Scalability is one of the Software Defined Network features that makes it more efficient than
the traditional network. Due to this feature, a huge number of hosts connect to the network …

A robust user authentication framework for bigdata

GA Al-Rummana, AHA Al Ahdal… - 2021 Third International …, 2021 - ieeexplore.ieee.org
Authentication is a concern in any security system, as it is considered as one of the most
important mechanisms to ensure security and privacy because it determines the identity of …

A Robust Authentication Technique for Client–Server Secure Login

LD Anh, H Mutaher, A Bijalwan - Creative Approaches Towards …, 2024 - Wiley Online Library
Client–server security faces significant challenges, including the risk of Man‐in‐the‐Middle
attacks (MITM), data confidentiality, integrity, authentication concerns, and the need to adapt …

Security and Attack Prevention in Software-Defined Network

R Ye, Y Ouyang, X Che - 2024 International Conference on …, 2024 - ieeexplore.ieee.org
With the development and application of software defined network (SDN) technology,
network architecture has undergone profound changes, providing more flexible and …