![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
-
Article
Open AccessA multifaceted survey on privacy preservation of federated learning: progress, challenges, and opportunities
Federated learning (FL) refers to a system of training and stabilizing local machine learning models at the global level by aggregating the learning gradients of the models. It reduces the concern of sharing t...
-
Article
A hybrid IDS for detection and mitigation of sinkhole attack in 6LoWPAN networks
The Internet of Things (IoT) is an expanding field of computer networks where resource-constrained devices connect to the internet through various wireless technologies. IoT systems already cover a broad spectrum...
-
Article
Synthesis and characterization of related compounds of Bisoprolol fumarate: a β-blocker agent
Bisoprolol is a beta blocker used for the treatment of high blood pressure. During the synthesis and scale up of Bisoprolol, several related compounds will be generated. In this article we have disclosed a fac...
-
Chapter and Conference Paper
Anonymous and Privacy Preserving Attribute-Based Decentralized DigiLocker Using Blockchain Technology
DigiLocker is an Aadhaar-based sharable public cloud service from Government of India. Similar to other centralized services, DigiLocker may operate the system to its full discretion which may not be fully ali...
-
Chapter and Conference Paper
Hierarchical Aadhaar-Based Anonymous eSign Based on Group Signatures
In the past few years, other than traditional security requirements, privacy and anonymity are also getting increased importance. For example, in case of the online electronic signature service, eSign, an eSig...
-
Chapter and Conference Paper
Design Fiction: A Way to Foresee the Future of Human–Computer Interaction Design Challenges
Human–computer interaction is centred around exploring the relationship between computational technologies and their users. HCI designers address the concerns of users by making innovative use of computational...
-
Chapter and Conference Paper
Load Profile Oriented Balanced Cluster Assignment in 5G IoT Based Sensor Network
One of the massive machine type communication (mMTC) applications for monitoring and sensing in 5G cellular network is the Internet of Things (IoT) based wireless sensor network (WSN). Load balanced cluster fo...
-
Chapter and Conference Paper
Privacy Enhanced Registered Devices for Fine-Grained Access Control
Aadhaar is one of the largest biometric identity systems in the world which aims to assign a unique digital identity to each resident of India. A resident can authenticate himself using his Aadhaar number and ...
-
Chapter and Conference Paper
Energy-aware Application Scheduling on DVFS-Enabled Edge Computing with Mobile–Edge–Cloud Cooperation
With a significant increase in the compute-intensive mobile applications in recent times, the seamless integration of the cloud platform with mobile devices becomes essential. As a result, the mobile cloud com...
-
Chapter and Conference Paper
An Artificial Intelligence-Based Approach Towards Segregation of Folk Songs
genre/type classification has been an active area of interest for researchers. There has been development of disparate systems for Western music, but a scarcity of such systems is observed for India...
-
Chapter
Demystifying Security on NDN: A Survey of Existing Attacks and Open Research Challenges
Named Data Networking (NDN) is a clean slate Future Internet Architecture that incorporates the visionary idea of focusing on contents instead of its location/host. It is mainly designed to address long-standi...
-
Chapter and Conference Paper
LIENE: Lifetime Enhancement for 6LoWPAN Network Using Clustering Approach Use Case: Smart Agriculture
The Internet of Things (IoT) is one of the largest technological evolutions of computing. With the rapid development of communication, there was a tremendous growth of IoT technology across various fields. IoT de...
-
Chapter and Conference Paper
Designing a Blockchain Based Framework for IoT Data Trade
With its application ranging from smart homes and wearables to smart vehicles and smart cities, Internet of Things(IoT) devices have become an integral part of our lives. These devices are enabled with sensing...
-
Chapter and Conference Paper
Misbehavior Detection in C-ITS Using Deep Learning Approach
Cooperative Intelligent Transportation Systems (C-ITS) is one of the most prominent solutions to facilitate many new exciting applications concerning road safety, mobility, environment, and driving comfort. Th...
-
Chapter
PGRDP: Reliability, Delay, and Power-Aware Area Minimization of Large-Scale VLSI Power Grid Network Using Cooperative Coevolution
Power grid network (PGN) of a VLSI system-on-chip (SoC) occupies a significant amount of routing area in a chip. As the number of functional blocks is increasing in an SoC chronologically, the need of the hour...
-
Chapter and Conference Paper
ReFIT: Reliability Challenges and Failure Rate Mitigation Techniques for IoT Systems
As the number of Internet-of-Things (IoT) devices increases, ensuring the reliability of the IoT system has become a challenging job. Apart from the emerging security issues, reliable IoT system design depends...
-
Chapter and Conference Paper
Evaluating DASH Player QoE with MPTCP in Presence of Packet Loss
MPTCP aggregates multiple network interfaces for a single TCP session for enhanced transfer rates and improved reliability to applications. Due to this property, MPTCP has the potential to provide better end-u...
-
Chapter and Conference Paper
BRAIN: Buffer Reservation Attack PreventIoN Using Legitimacy Score in 6LoWPAN Network
Internet of Things (IoT) is a network of tangible objects forming a Low-Power Network with each connected device having limited resources and computing power, and each entrusted with a task of data acquisition...
-
Chapter and Conference Paper
Energy Efficient Approach to Detect Sinkhole Attack Using Roving IDS in 6LoWPAN Network
The Internet of Things (IoT) has become a widespread technology where everyday objects are being transferred toward intelligent devices. These smart devices incorporate sensing, computing, and networking abilitie...
-
Chapter and Conference Paper
TA-ACS: A Trust Aware Adaptive Carrier Selection Scheme for Reliable Routing in Delay Tolerant Networks
Delay Tolerant Network (DTN) is an infrastructure-less wireless network characterized with sporadic link connectivity and probable co-existence of high end-to-end delay. It relies on opportunistic contacts for...