We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 41-60 of 1,702 results
  1. The GMW MPC Protocol

    All the MPC protocols discussed so far offer perfect-security against computationally-unbounded adversaries. For the next few chapters, we shift our...
    Chapter 2022
  2. Block-Privacy: Privacy Preserving Smart Healthcare Framework: Leveraging Blockchain and Functional Encryption

    Early adoption of Internet of Medical Things (IoMT) are enhancing the healthcare sector in all directions. Though the advances are adding advantages...
    Bhaskara Santhosh Egala, Ashok Kumar Pradhan, Shubham Gupta in Internet of Things. Advances in Information and Communication Technology
    Conference paper 2024
  3. KEP: Keystroke Evoked Potential for EEG-Based User Authentication

    In recent years, the rapid proliferation of Brain-Computer Interface (BCI) applications has made the issue of security increasingly important. User...
    Jiaxuan Wu, Wei-Yang Chiu, Weizhi Meng in Artificial Intelligence Security and Privacy
    Conference paper 2024
  4. Private Set Operations from Multi-query Reverse Private Membership Test

    Private set operations allow two parties to perform secure computation on their private sets, including intersection, union and functions of...
    Yu Chen, Min Zhang, ... Weiran Liu in Public-Key Cryptography – PKC 2024
    Conference paper 2024
  5. A survey on IoT application layer protocols, security challenges, and the role of explainable AI in IoT (XAIoT)

    The Internet of Things (IoT) plays a fundamental role in contemporary society, necessitating an in-depth comprehension of its application layer...

    Vagner E. Quincozes, Silvio E. Quincozes, ... Anis Koubaa in International Journal of Information Security
    Article 13 March 2024
  6. Fog computing in enabling 5G-driven emerging technologies for development of sustainable smart city infrastructures

    The usage of 5G-enabled IoT devices is rising exponentially as humans tend to shift towards a more automated lifestyle. A significant amount of IoT...

    Siddhant Jain, Shashank Gupta, ... Joel J. P. C. Rodrigues in Cluster Computing
    Article 07 January 2022
  7. A Survey on Delegated Computation

    In the area of delegated computation, the main problem asks how a computationally weaker client device can obtain help from one or more...
    Giovanni Di Crescenzo, Matluba Khodjaeva, ... Vladimir Shpilrain in Developments in Language Theory
    Conference paper 2022
  8. An Introduction to Classical and Modern Cryptography

    The remote environment bounded us to share information, documents, money, etc. with the help of applications, devices, and tools. The information,...
    Rajkumar Banoth, Rekha Regar in Classical and Modern Cryptography for Beginners
    Chapter 2023
  9. Industrial Internet of Things (IIoT) Applications of Edge and Fog Computing: A Review and Future Directions

    With rapid technological advancements within the domain of Internet of Things (IoT), strong trends have emerged which indicate rapid growth in the...
    G. S. S. Chalapathi, Vinay Chamola, ... Rajkumar Buyya in Fog/Edge Computing For Security, Privacy, and Applications
    Chapter 2021
  10. Privacy and data protection in the enterprise world

    Enterprise systems are becoming more complex with an interconnected network of large heterogeneous devices. These systems generate, process and store...

    Imtiyazuddin Shaik, Nishanth Chandran, Rajan M. A in CSI Transactions on ICT
    Article 21 February 2022
  11. Applicable image cryptosystem using bit-level permutation, particle swarm optimisation, and quantum walks

    Digital data plays a paramount part in various fields of life, in which multimedia data represent the majority of transferred digital data via...

    Bassem Abd-El-Atty, Ahmed A. Abd EL-Latif in Neural Computing and Applications
    Article 08 June 2023
  12. Enhancing biometric authentication security through the novel integration of graph theory encryption and chaotic logistic map**

    The escalating reliance on biometric systems for identity verification underscores the imperative for robust data protection mechanisms. Biometric...

    Walid El-Shafai, A. El-Mesady, F. M. Kamal in Multimedia Tools and Applications
    Article 02 July 2024
  13. Characterizing Privacy Risks in Healthcare IoT Systems

    The advancement in Internet of Things (IoT) technology has been having a huge societal and economic impact, effectively changing the paradigms in...
    Shuai Li, Alessio Baiocco, Shouhuai Xu in Secure and Resilient Digital Transformation of Healthcare
    Conference paper 2024
  14. On the Related-Key Attack Security of Authenticated Encryption Schemes

    Related-key attacks (RKA) are powerful cryptanalytic attacks, where the adversary can tamper with the secret key of a cryptographic scheme. Since...
    Sebastian Faust, Juliane Krämer, ... Patrick Struck in Security and Cryptography for Networks
    Conference paper 2022
  15. Laying the Foundation: Pixels, Logic, and Data Streams

    As we peel back the layers of sophisticated software applications, a harmonious interplay between various components becomes apparent. In this...
    Arpit Dwivedi in CodeMosaic
    Chapter 2024
  16. Quantum-Resistant Software Update Security on Low-Power Networked Embedded Devices

    As the Internet of Things (IoT) rolls out today to devices whose lifetime may well exceed a decade, conservative threat models should consider...
    Gustavo Banegas, Koen Zandberg, ... Benjamin Smith in Applied Cryptography and Network Security
    Conference paper 2022
  17. Efficient Forward Secrecy for TLS-PSK from Pure Symmetric Cryptography

    Transport layer security (TLS) is by far the most important protocol on the Internet for establishing secure session keys and providing...
    Li Duan, Yong Li, Lijun Liao in Information Security
    Conference paper 2023
  18. Secure cloud-based mobile apps: attack taxonomy, requirements, mechanisms, tests and automation

    The adoption and popularization of mobile devices, such as smartphones and tablets, accentuated after the second decade of this century, has been...

    Francisco T. Chimuco, João B. F. Sequeiros, ... Pedro R. M. Inácio in International Journal of Information Security
    Article Open access 17 February 2023
  19. MESSB–LWE: multi-extractable somewhere statistically binding and learning with error-based integrity and authentication for cloud storage

    The concept of cloud envisioned cyber-physical systems is a practical technology that allows users to interact with each other while transferring...

    Dilli Babu Salvakkam, Rajendra Pamula in The Journal of Supercomputing
    Article 05 May 2022
  20. An Innovative Blockchain-Based Orchestrator for Osmotic Computing

    In the last decade, the increasing number of devices connected to the internet has allowed the development of new technologies for distributed...

    Armando Ruggeri, Antonio Celesti, ... Massimo Villari in Journal of Grid Computing
    Article 20 December 2021
Did you find what you were looking for? Share feedback.