Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleNovember 2024
Optimized Data Replication in Cloud Using Hybrid Optimization Approach
Transactions on Emerging Telecommunications Technologies (TETT), Volume 35, Issue 11https://doi.org/10.1002/ett.70022ABSTRACTCloud computing (CC), in contrast to traditional high‐performance computing environments, is a group of imaginary and networked resources of computing that are controlled by one unified maximum‐performance computing power. Here, this work aims ...
In reality, there are two scenarios for prioritization: queuing both high‐priority and low‐priority data, and basing costs on an analysis of storage demand. The job may be finished more rapidly because the maximum priority queue comprises demands with a ...
- review-articleOctober 2024
Botnets Unveiled: A Comprehensive Survey on Evolving Threats and Defense Strategies
Transactions on Emerging Telecommunications Technologies (TETT), Volume 35, Issue 11https://doi.org/10.1002/ett.5056ABSTRACTBotnets have emerged as a significant internet security threat, comprising networks of compromised computers under the control of command and control (C&C) servers. These malevolent entities enable a range of malicious activities, from denial of ...
Exploring botnets: evolution, tactics, countermeasures. This survey dives into botnets, covering life cycles, communication, and evasion tactics. It highlights challenges and future strategies for combating cyber threats. image image
- research-articleSeptember 2024
LBCSC: Lattice‐based chameleon signcryption scheme for secure and privacy‐preserving vehicular communications
Transactions on Emerging Telecommunications Technologies (TETT), Volume 35, Issue 10https://doi.org/10.1002/ett.5040AbstractGuaranteeing the anonymity of the vehicle and the integrity of the transmitted message are two indispensable conditions in vehicular ad‐hoc network. Anonymous signature can achieve the two function. However, existing anonymous signature schemes ...
In order to solve the problem of signature misuse due to publicly verified signatures, a lattice‐based chameleon signcryption scheme is proposed, aiming at securing vehicle identities and data in vehicular ad‐hoc networks. The scheme is resistant to ...
- research-articleJanuary 2024
Hybrid homomorphic‐asymmetric lightweight cryptosystem for securing smart devices: A review
Transactions on Emerging Telecommunications Technologies (TETT), Volume 35, Issue 1https://doi.org/10.1002/ett.4866AbstractThe Internet of Things (IoT) has emerged as a new concept in information and communication technology, and its structure depends on smart device communications. It was evolving as a significant factor of the Internet and made the interconnection ...
A comparative study of the various cryptosystems was conducted, and the contributions, results and disadvantages were examined. To our knowledge, examinations based on hybrid cryptosystems and lightweight homomorphic algorithms are also being carried out ...
- research-articleJanuary 2024
Anomalous vehicle recognition in smart cities using persistent bloom filter: Memory efficient and intelligent monitoring
Transactions on Emerging Telecommunications Technologies (TETT), Volume 35, Issue 1https://doi.org/10.1002/ett.4896AbstractGlobally, there is a rapid and significant change in the distribution of the urban population. Concerning which there is an increase in traffic rule violations in smart cities, resulting in traffic congestion and accidents. Anomalous vehicle ...
This research aims to create an intelligent monitoring system for recognizing anomalous vehicles in smart cities, utilizing memory‐efficient persistent bloom filters. The solution aims to improve road safety by implementing a real‐time, responsive ...
-
- research-articleSeptember 2022
Field programmable gate array implementation of an adaptive filtering based noise reduction and enhanced compression technique for healthcare applications
Transactions on Emerging Telecommunications Technologies (TETT), Volume 34, Issue 1https://doi.org/10.1002/ett.4654AbstractNowadays, the development of e‐health monitoring devices is getting more demand for remote health applications. In addition, cardiovascular diseases is considered the most chronic disease in recent years. So, this requires a fast diagnosis and ...
Nowadays, the development of e‐health monitoring devices is getting more demand for remote health applications. In addition, cardiovascular diseases are considered the most chronic disease in recent years. So, this requires a fast diagnosis and therapy to ...
- research-articleMay 2022
Oblivious transfer with hidden access control and outsourced decryption from deterministic finite automata‐based functional encryption for an in‐vehicle sensor database system
Transactions on Emerging Telecommunications Technologies (TETT), Volume 33, Issue 5https://doi.org/10.1002/ett.3870AbstractVehicle sensors are continuously observing the state of the vehicle, collecting and transmitting data from/to surrounding road users. The sensors data are then processed and stored in an in‐vehicle sensor database in the form of records. These ...
- research-articleApril 2022
A unidirectional certificateless proxy re‐signature scheme based on lattice
Transactions on Emerging Telecommunications Technologies (TETT), Volume 33, Issue 4https://doi.org/10.1002/ett.4412AbstractAs a kind of special digital signature, proxy re‐signature is becoming more and more important in transparent certification and management of group signatures. But most existing proxy re‐signature schemes cannot resist collusion attack. So we ...
We propose a unidirectional certificateless proxy re‐signature scheme by using dual modulus technology. Compared with the previous scheme, our scheme is unidirectional, does not require key escrow, can prevent man‐in‐the‐middle attacks, and can resist the ...
- research-articleApril 2022
Integrating encryption techniques for secure data storage in the cloud
Transactions on Emerging Telecommunications Technologies (TETT), Volume 33, Issue 4https://doi.org/10.1002/ett.4108AbstractCloud computing has emerged as one of the most groundbreaking technologies to have redefined the bounds of conventional computing techniques. It has ushered in a paradigm shift and pushed the frontiers of how computing assets, inclusive of ...
Secure Cloud Storage Overview. image image
- research-articleMarch 2022
Analysis of attribute‐based cryptographic techniques and their application to protect cloud services
Transactions on Emerging Telecommunications Technologies (TETT), Volume 33, Issue 3https://doi.org/10.1002/ett.3667AbstractRecent technological advances such as the internet of things, fog computing, and cloud applications lead to exponential growth in the amount of generated data. Indeed, cloud storage services have experienced unprecedented usage demand. The loss of ...
image image
Although, cloud storage services have experienced unprecedented usage demand, the loss of users control over their outsourced data introduced several security and privacy concerns. Attribute‐based cryptography is commonly used to provide ...
- research-articleFebruary 2022
An intelligent linear time trajectory data compression framework for smart planning of sustainable metropolitan cities
Transactions on Emerging Telecommunications Technologies (TETT), Volume 33, Issue 2https://doi.org/10.1002/ett.3886AbstractThe urban road networks and vehicles generate exponential amount of spatio‐temporal big‐data, which invites researchers from diverse fields of interest. Global positioning system devices may transceive data every second thus producing huge amount ...
Taxi trajectories. image image
- research-articleFebruary 2022
An analytic study of architecture, security, privacy, query processing, and performance evaluation of database‐as‐a‐service
Transactions on Emerging Telecommunications Technologies (TETT), Volume 33, Issue 2https://doi.org/10.1002/ett.3814AbstractIn the present era of technology, the pace of data generation is very high, and the biggest challenge is the manageability of data with efficient and secure storage options as well as at lower cost. Therefore, in this article, we have elaborated ...
image image In the current era, the pace of data generation is very high, the biggest challenge is the manageability of data with efficient and secure storage options as well as a lower cost. This article elaborates on the Database‐as‐a‐Service concept. An ...
- research-articleJuly 2021
Optimal deep learning based image compression technique for data transmission on industrial Internet of things applications
Transactions on Emerging Telecommunications Technologies (TETT), Volume 32, Issue 7https://doi.org/10.1002/ett.3976AbstractRecently, industrial Internet of things becomes more popular and it involves a group of intelligent devices linked to create systems which observe, gather, communicate, and investigate data. In this view, the demand for compression techniques in ...
Overall structural design of the presented technique. image image
- research-articleJune 2021
Utilizing the column imprints to accelerate no‐partitioning hash joins in large‐scale edge systems
Transactions on Emerging Telecommunications Technologies (TETT), Volume 32, Issue 6https://doi.org/10.1002/ett.4084AbstractWith the increasing number of edge devices in large‐scale edge systems, more and more data are collected to be processed. In such big data scenarios, there is a resurgence of interest in main‐memory analytic databases because of the large RAM ...
With the increasing number of edge devices in large‐scale edge systems, more and more data are collected to be processed. In such big data scenarios, there is a resurgence of interest in main‐memory analytic databases because of the large RAM capacity of ...
- research-articleFebruary 2021
A novel multi‐image visually meaningful encryption algorithm based on compressive sensing and Schur decomposition
Transactions on Emerging Telecommunications Technologies (TETT), Volume 32, Issue 2https://doi.org/10.1002/ett.4071AbstractImage encryption algorithm is an important telecommunication technology for protecting personal security. In this article, we propose a novel multi‐image visual encryption algorithm based on compressive sensing (CS) and Schur decomposition. First, ...
This article presents a novel multi‐image visual encryption algorithm based on compressive sensing and Schur decomposition, in which discrete wavelet transform (DWT), confusion, compressive sensing, two‐level lifting wavelet transform (LWT), Schur ...
- research-articleFebruary 2021
Security of multimedia communication with game trick based fast, efficient, and robust color‐/gray‐scale image encryption algorithm
Transactions on Emerging Telecommunications Technologies (TETT), Volume 32, Issue 2https://doi.org/10.1002/ett.4034AbstractFreshly, an innumerable chaotic system based complex and more time‐consuming image encryption algorithms have been proposed. The majority of those have scrambling and diffusion like two phases or rounds before performing the actual encryption, ...
DNA based scrambling plus diffusion of image pixels. image image
- research-articleJanuary 2021
An efficient priority‐based convolutional auto‐encoder approach for electrocardiogram signal compression in Internet of Things based healthcare system
Transactions on Emerging Telecommunications Technologies (TETT), Volume 32, Issue 1https://doi.org/10.1002/ett.4115AbstractDue to advancements in healthcare monitoring systems, the Internet of Things concepts are proficiently utilized in the medical field to detect and diagnose the physical health problems. The compression of more substantial medical information is a ...
We proposed priority‐based convolutional auto‐encoder (PCAE) for ECG signal compression with almost zero reconstruction error by encoding the signals into lower‐dimensional vectors in convolutional layers which are again reconstructed using a decoding ...
- research-articleDecember 2020
A multidimensional index for range queries over Cayley‐based DHT
Transactions on Emerging Telecommunications Technologies (TETT), Volume 31, Issue 12https://doi.org/10.1002/ett.3944AbstractThis paper studies indexing multidimensional data based on the Borel Cayley graph. In order to provide the scalable query method, a special distributed hash table based on Borel Cayley graph is applied to key‐value–based data‐storing system. By ...
By using the two different representations of Borel Cayley graph, we present a novel indexing method. We found the chordal ring constants and a mapping equation to achieve the transformation between the two different representations. Compared with the ...
- research-articleJune 2018
Design of lattice‐based ElGamal encryption and signature schemes using SIS problem
Transactions on Emerging Telecommunications Technologies (TETT), Volume 29, Issue 6https://doi.org/10.1002/ett.3255AbstractThe emerging technologies like quantum computing and cloud computing have a complex computing power and can break the security of the classical cryptographic constructions (like ElGamal's cryptosystem). Thus, we were motivated to work on hard ...
image image In this proposal, we present a lattice‐based version of discrete logarithm problem‐based ElGamal public‐key encryption and signature schemes that exhibit strong security features and efficient implementation. The security of these presented ...