![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
-
Article
User-selectable interaction and privacy features in mobile app recommendation (MAR)
The research in the mobile app recommendation system (MARS) is steadily increasing due to the involvement of big data and social information. Few existing systems explore the possibility of social interaction ...
-
Article
Correction: Privacy preservation in the internet of vehicles using local differential privacy and IOTA ledger
-
Article
Privacy preservation in the internet of vehicles using local differential privacy and IOTA ledger
With the growth in Vehicular Ad Hoc Network (VANET) technology, many vehicular devices are communicating with each other and with the edge nodes, generating a massive amount of data. One of the biggest challen...
-
Article
A Deep Learning-Based Privacy-Preserving Model for Smart Healthcare in Internet of Medical Things Using Fog Computing
With the emergence of COVID-19, smart healthcare, the Internet of Medical Things, and big data-driven medical applications have become even more important. The biomedical data produced is highly confidential a...
-
Article
Thermal image encryption based on laser diode feedback and 2D logistic chaotic map
Importance of thermal images in an electric power station, nuclear plants, for extraction of petroleum products, biological and medical is not unseen. Based on that, security of thermal images is very importan...
-
Article
Privacy preservation in e-health cloud: taxonomy, privacy requirements, feasibility analysis, and opportunities
Electronic health records (EHRs) are increasingly employed to maintain, store and share varied types of patient data. The data can also be utilized for various research purposes, such as clinical trials or epi...
-
Article
OBAC: towards agent-based identification and classification of roles, objects, permissions (ROP) in distributed environment
Access control is used to prevent data from access of unauthorized users. Over the years, several access control models have been proposed to meet requirements of various applications and domains. Role-based a...
-
Article
S-box design based on optimize LFT parameter selection: a practical approach in recommendation system domain
The strength of cryptography encryption is strongly depended upon the substitution box (S-box), hence highly non-linear S-box is appreciated in cryptography. In this work, we proposed a scheme to select the op...
-
Article
A Secure Provenance Scheme for Detecting Consecutive Colluding Users in Distributed Networks
Data provenance is becoming extremely important these days for distributed environment, due to the ease in sharing and modifying data stored (e.g. cloud storage systems). However, the protection of provenance ...
-
Article
An improved surveillance video forgery detection technique using sensor pattern noise and correlation of noise residues
Digital videos have become an important aspect of our lives lately, from a personal memorable to surveillance videos which can be presented in a court as an evidence now, this video evidence can be very import...
-
Article
Autonomic workload performance tuning in large-scale data repositories
The workload in large-scale data repositories involves concurrent users and contains homogenous and heterogeneous data. The large volume of data, dynamic behavior and versatility of large-scale data repositori...
-
Article
XM-tree: data driven computational model by using metric extended nodes with non-overlap** in high-dimensional metric spaces
Finding similar objects based on a query and a distance, remains a fundamental problem for many applications. The general problem of many similarity measures is to focus the search on as few elements as possib...
-
Article
Anonymous and formally verified dual signature based online e-voting protocol
The traditional paper-based voting is severely criticized after having found evidence of rigging in elections, leading to the uncertainty in the fairness of the election process. Traditional voting systems hav...
-
Article
An efficient approach for publishing microdata for multiple sensitive attributes
The publication of microdata is pivotal for medical research purposes, data analysis and data mining. These published data contain a substantial amount of sensitive information, for example, a hospital may pu...
-
Chapter and Conference Paper
A Parallel Implementation of GHB Tree
Searching in a dataset remains a fundamental problem for many applications. The general purpose of many similarity measures is to focus the search on as few elements as possible to find the answer. The current...
-
Article
Formal modeling and verification of security controls for multimedia systems in the cloud
Organizations deploy the Security Information and Event Management (SIEM) systems for centralized management of security alerts for securing their multimedia content. The SIEM system not only preserves events ...
-
Chapter and Conference Paper
m-Skin Doctor: A Mobile Enabled System for Early Melanoma Skin Cancer Detection Using Support Vector Machine
Early detection of skin cancer is very important as it is one of the dangerous form of cancer spreading vigorously among humans. With the advancement of mobile technology; mobile enabled skin cancer detection ...