Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
Reflects downloads up to 12 Sep 2024Bibliometrics
Skip Table Of Content Section
research-article
Privacy-preserving Byzantine-robust federated learning
Highlights

  • We propose a scheme of Privacy-preserving Byzantine-robust federated learning (PBFL).

Abstract

Robustness of federated learning has become one of the major concerns since some Byzantine adversaries, who may upload false data owning to unreliable communication channels, corrupted hardware or even malicious attacks, might be ...

research-article
Repudiable ring signature: Stronger security and logarithmic-size
Highlights

  • The security model of repudiable ring signature is improved.
  • A more efficient ...

Abstract

Ring signature, introduced by Rivest et al. [Asiacrypt’01], allows a person to sign a document on behalf of an ad-hoc group (or ring) while hiding the identity of the actual signer. But the anonymity provided by the ring signature ...

research-article
Availability and service disruption of network services: From high-level requirements to low-level configuration constraints
Highlights

  • A method for the availability of network services in the context of NFV
  • A ...

Abstract

In the context of Network Function Virtualization (NFV), a Network Service (NS) is defined as a composition of Network Functions (NFs), which can be Virtual Network Functions (VNFs) or Physical Network Functions (PNFs). The ...

research-article
Private blockchain-envisioned drones-assisted authentication scheme in IoT-enabled agricultural environment
Highlights

  • Proposed a new authentication and key management scheme for IoT-enabled IPA, called AKMSAgriIoT, with the private blockchain-based solution.

Abstract

In an Intelligent Precision Agriculture (IPA), several Internet of Things (IoT) smart devices and drones can be deployed to monitor an agricultural environment. The drones can be further utilized to collect the data from smart devices ...

research-article
Designing secure and lightweight user access to drone for smart city surveillance
Highlights

  • This paper proves that the user access to drone scheme of Wazid et al. is vulnerable to several attacks including stolen verifier, traceability attacks.

Abstract

The Internet of drones (IoD) is a very useful application of the Internet of things (IoT) and it can help the daily life comfort through various functions including the smart city surveillance. The IoD can enhance the comfort to reach ...

research-article
An IoT-based approach for optimal relative positioning of solar panel arrays during backtracking
Highlights

  • The demand to meet emerging delay constraint IoT design and usage in solar energy plants has been highlighted and an effective application is introduced co-...

Abstract

There are several studies in the literature and common solutions in practice about solar tracking systems (STSs) and their effective usage in solar power plants. However, they all mainly lack of a serious consideration to eliminate the ...

research-article
Side-channel information leakage analysis and countermeasures in an embedded CPU microarchitecture
Highlights

  • Based on the implementation of the AES-128, a detailed analysis of side-channel information leakage in an embedded CPU and its components from the ...

Abstract

Side-channel attacks (SCAs) have become a significant threat nowadays to cryptographic devices, especially central processing units (CPUs). Based on the implementation of AES-128, the side-channel information leakage analysis is ...

research-article
Integration of fuzzy-weighted zero-inconsistency and fuzzy decision by opinion score methods under a q-rung orthopair environment: A distribution case study of COVID-19 vaccine doses
Highlights

  • Formulated an extension of FWZIC method under fuzzy environment q-ROFS were called q-ROFWZIC.

Abstract

Owing to the limitations of Pythagorean fuzzy and intuitionistic fuzzy sets, scientists have developed a distinct and successive fuzzy set called the q-rung orthopair fuzzy set (q-ROFS), which eliminates restrictions encountered by ...

research-article
Efficient maliciously secure two-party mixed-protocol framework for data-driven computation tasks
Highlights

  • Introduce a new primitive called committed oblivious linear evaluation (C-OLE) based on the homomorphic commitments in the malicious model.

Abstract

In the artificial intelligence era, data-driven computation tasks, such as machine learning, have been playing an essential role as the decision-maker to unlock the value of big data in many fields. Moreover, the ultimate goal of ...

research-article
Mixed-protocol multi-party computation framework towards complex computation tasks with malicious security
Highlights

  • Construct six types of share conversion protocols in the malicious model with the homomorphic commitments technique relying on the standard model.

Abstract

With the rapid development of secure multi-party computation (MPC) over past decades, applications of MPC has been moving from completing simple computation tasks (e.g., private set intersection) to complex computation tasks (e.g., ...

research-article
A new secure arrangement for privacy-preserving data collection
Highlights

  • A secure arrangement is proposed in the manuscript, which is important for privacy data collection.

Abstract

A big number of users’ healthy data are necessary for the Internet of Things (IoT) healthcare. Therefore, the institutions, which have access to more data can provide better medical services such as more accurate diagnosis. However, ...

research-article
A novel and efficient index based web service discovery approach
Highlights

  • We propose in this paper a new index scheme that aims at reducing the retrieval time comparing to MLIM (The Muti Level Index Model) and the inverted index.

Abstract

Nowadays, with the expansion of the number of web services, the discovery and the selection of the latter are becoming complex tasks. To address this issue, different methods (indexing, clustering, database etc.) have been proposed in ...

research-article
A process assessment model for big data analytics
Highlights

  • Provides a review of the available capability maturity models in BDA domain.
  • ...

Abstract

Today, business success is essentially powered by data-centric software. Big data analytics (BDA) grasp the potential of generating valuable insights and empowering businesses to support their strategic decision-making. However, ...

research-article
Increment of insecure RSA private exponent bound through perfect square RSA diophantine parameters cryptanalysis
Highlights

  • A new weak RSA key equation structure that solves the factoring problem under certain specified conditions in polynomial time is proposed.

Abstract

The public parameters of the RSA cryptosystem are represented by the pair of integers N and e. In this work, first we show that if e satisfies the Diophantine equation of the form e x 2 − ϕ ( N ) y 2 = z for appropriate values of x , y ...

research-article
Privacy-Preserving federated learning in medical diagnosis with homomorphic re-Encryption
Highlights

  • A federated learning scheme with homomorphic re-encryption is proposed, which collects data from the IoT devices, completes model training through the fog ...

Abstract

Unlike traditional centralized machine learning, distributed machine learning provides more efficient and useful application scenarios. However, distributed learning may not meet some security requirements. For example, in medical ...

Comments