Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleJuly 2024
Efficient and secure signcryption-based data aggregation for Internet of Drone-based drone-to-ground station communication
AbstractThe evolution of drone-based communication has given rise to the Internet of Drones (IoD) paradigm. Drones are currently employed for data collection in diverse monitoring applications such as border security, forest fire management, smart ...
Highlights- The article proposes an improved pairing free identity-based signcryption scheme.
- Efficient and secure data aggregation scheme for drone-to-ground station communication.
- The proposed data aggregation is secure against well-known ...
- research-articleJuly 2024
Deep learning-based encryption for secure transmission digital images: A survey
Computers and Electrical Engineering (CENG), Volume 116, Issue CMay 2024https://doi.org/10.1016/j.compeleceng.2024.109236Highlights- A comprehensive and up-to-date review of deep learning-based encryption for digital images is presented.
- A detail overview of image encryption using deep learning models along with recent applications are discussed.
- Comparative ...
With the innovation of high-throughput big data storage technology and the construction of digital information systems in media applications, images are the common and most popular media carriers and are generated and transmitted in huge ...
Graphical abstractDisplay Omitted
- research-articleJuly 2024
The unresolved need for dependable guarantees on security, sovereignty, and trust in data ecosystems
- Johannes Lohmöller,
- Jan Pennekamp,
- Roman Matzutt,
- Carolin Victoria Schneider,
- Eduard Vlad,
- Christian Trautwein,
- Klaus Wehrle
Data & Knowledge Engineering (DAKE), Volume 151, Issue CMay 2024https://doi.org/10.1016/j.datak.2024.102301AbstractData ecosystems emerged as a new paradigm to facilitate the automated and massive exchange of data from heterogeneous information sources between different stakeholders. However, the corresponding benefits come with unforeseen risks as sensitive ...
- research-articleJuly 2024
MitM attacks on intellectual property and integrity of additive manufacturing systems: A security analysis
Computers and Security (CSEC), Volume 140, Issue CMay 2024https://doi.org/10.1016/j.cose.2024.103810AbstractAdditive Manufacturing (AM) was originally invented to reduce the cost of the prototyping process. Over time, the technology evolved to be faster, more accurate, and affordable. These factors, in addition to the potential use of AM in parts ...
-
- research-articleApril 2024
CIA Security for Internet of Vehicles and Blockchain-AI Integration
Journal of Grid Computing (SPJGC), Volume 22, Issue 2Jun 2024https://doi.org/10.1007/s10723-024-09757-3AbstractThe lack of data security and the hazardous nature of the Internet of Vehicles (IoV), in the absence of networking settings, have prevented the openness and self-organization of the vehicle networks of IoV cars. The lapses originating in the areas ...
- research-articleJuly 2024
MIWET: Medical image watermarking using encryption and fusion technique
Computers and Electrical Engineering (CENG), Volume 115, Issue CApr 2024https://doi.org/10.1016/j.compeleceng.2024.109114AbstractDigital augmentation of contemporary healthcare has directed the expansion of ICT-based systems. At this stage, a variety of telemedical support has been implemented to ensure the provision of medical utilities. Data Privacy, reliability, and ...
- ArticleJune 2024
An End-to-End Secure Solution for IoMT Data Exchange
Applied Cryptography and Network Security WorkshopsMar 2024, Pages 3–15https://doi.org/10.1007/978-3-031-61486-6_1AbstractIn the field of healthcare, the emerging concept of the Internet of Medical Things (IoMT) plays a crucial role in enhancing the efficiency of medical services and introducing innovative solutions. Traditional healthcare services are no longer ...
- research-articleFebruary 2024
Enhanced mechanism to prioritize the cloud data privacy factors using AHP and TOPSIS: a hybrid approach
Journal of Cloud Computing: Advances, Systems and Applications (JOCCASA), Volume 13, Issue 1Feb 2024https://doi.org/10.1186/s13677-024-00606-yAbstractCloud computing is a new paradigm in this new cyber era. Nowadays, most organizations are showing more reliability in this environment. The increasing reliability of the Cloud also makes it vulnerable. As vulnerability increases, there will be a ...
- research-articleJanuary 2024
Enhancing robustness and security of medical images through composite watermarking method
Soft Computing - A Fusion of Foundations, Methodologies and Applications (SOFC), Volume 28, Issue 9-10May 2024, Pages 6809–6822https://doi.org/10.1007/s00500-023-09557-zAbstractWith the expansion of IOTs and Wireless devices, data transmission has increased over the internet. Maintaining security during data transmission using invisible watermarks has become a focus and has captured the attention of numerous researchers. ...
- research-articleMarch 2024
Blockchain technology as a tool for online elections
EBIMCS '23: Proceedings of the 2023 6th International Conference on E-Business, Information Management and Computer ScienceDecember 2023, Pages 1–4https://doi.org/10.1145/3644479.3644480The use of blockchain technology in relation to online elections is examined in this article. The article's introduction outlines the primary issues with the current electoral systems and suggests using blockchain technology as a fix. The blockchain ...
- research-articleDecember 2023
Adaptive Artificial Bee Colony Algorithm-Based Enhancement of Data Security in Cloud Computing
AbstractNowadays, the usage of network has been increased due to cloud computing. It is used in many applications because of its salient features such as reduced cost, hassle-free usage without the requirement of client–server model. The networked ...
- ArticleFebruary 2024
Like an Open Book? Read Neural Network Architecture with Simple Power Analysis on 32-Bit Microcontrollers
Smart Card Research and Advanced ApplicationsNov 2023, Pages 256–276https://doi.org/10.1007/978-3-031-54409-5_13AbstractModel extraction is a growing concern for the security of AI systems. For deep neural network models, the architecture is the most important information an adversary aims to recover. Being a sequence of repeated computation blocks, neural network ...
- ArticleSeptember 2023
Embracing XR System Without Compromising on Security and Privacy
AbstractVirtual, Augmented and Mixed Reality (VR/AR/MR) called together as Extended Reality (XR) have become increasingly popular in recent years, offering new opportunities for education, entertainment, and communication. However, the widespread adoption ...
- articleSeptember 2023
A Security Method for Cloud Storage Using Data Classification
International Journal of Grid and High Performance Computing (IJGHPC-IGI), Volume 15, Issue 1Mar 2023, Pages 1–17https://doi.org/10.4018/IJGHPC.329602Cloud computing is an information technology model that provides computing and storage resources as a service. Data storage security remains the main challenge in adapting this new model. The common solution to secure data in the cloud is data ...
- research-articleAugust 2023
Confidential Quantum Computing
ARES '23: Proceedings of the 18th International Conference on Availability, Reliability and SecurityAugust 2023, Article No.: 46, Pages 1–10https://doi.org/10.1145/3600160.3604982Quantum computing is becoming more accessible with increasing numbers of quantum platforms. The confidentiality and integrity of data and algorithms running on these systems are important assets that need to be protected from untrusted parties. Previous ...
- ArticleAugust 2023
Power Analysis Pushed too Far: Breaking Android-Based Isolation with Fuel Gauges
Advances in Information and Computer SecurityAug 2023, Pages 3–15https://doi.org/10.1007/978-3-031-41326-1_1AbstractEfficient power management is critical for embedded devices, both for extending their lifetime and ensuring safety. However, this can be a challenging task due to the unpredictability of the batteries commonly used in such devices. To address this ...
- research-articleJuly 2023
A decentralized blockchain-based authentication scheme for cross-communication in IoT networks
Cluster Computing (KLU-CLUS), Volume 27, Issue 3Jun 2024, Pages 2505–2523https://doi.org/10.1007/s10586-023-04094-8AbstractThe Internet of Things (IoT) is revolutionising our everyday life by connecting a massive number of smart objects. IoT is considered a key enabler of multiple emerging applications in several areas such as manufacturing, agriculture, healthcare, ...
- ArticleJuly 2023
“SHeMeD”: An Application on Secure Computation of Medical Cloud Data Based on Homomorphic Encryption
Computational Science and Its Applications – ICCSA 2023 WorkshopsJul 2023, Pages 116–133https://doi.org/10.1007/978-3-031-37120-2_8AbstractIn today’s Internet-centric world, two main challenges have arisen regarding data exploration: a) the privacy of sensitive data and b) the need for users to have an efficient way to manage their data. Cloud computing offers a cost-effective way ...
- research-articleJune 2023
A fog-based anonymous authentication scheme with location privacy for wireless body area network with FPGA implementation
International Journal of Information Security (IJOIS), Volume 23, Issue 1Feb 2024, Pages 1–13https://doi.org/10.1007/s10207-023-00717-8AbstractIn Healthcare 4.0, Wireless Body Area Networks (WBAN) takes place a major role in gathering real-time data of patients. The gathered real-time medical data is transferred through an insecure channel which may lead to several security attacks. To ...