Search
Search Results
-
Compact Structure-Preserving Signatures with Almost Tight Security
In structure-preserving cryptography, every building block shares the same bilinear groups. These groups must be generated for a specific, a priori...
-
An artificial intelligence lightweight blockchain security model for security and privacy in IIoT systems
The Industrial Internet of Things (IIoT) promises to deliver innovative business models across multiple domains by providing ubiquitous connectivity,...
-
Quantum cryptography based cloud security model (QC-CSM) for ensuring cloud data security in storage and accessing
In recent days, cloud computing is a universal computing and conventional paradigm, in which the resources are provided over the Internet based on...
-
Analysis of cyber security knowledge gaps based on cyber security body of knowledge
Due to the increasing number of cyber incidents and overwhelming skills shortage, it is required to evaluate the knowledge gap between cyber security...
-
An efficient security testing mechanism for Android Apps based on malware analysis and optimized XGBoost
Security Testing of Android Applications is a difficult issue. Malicious apps are a threat to the Android platform's security. Traditional solutions...
-
BPMN extension evaluation for security requirements engineering framework
In this paper we present an in-depth evaluation of the Business Process Management Notation (BPMN) security extension. The evaluation mechanism is...
-
Identity-Based Encryption with (Almost) Tight Security in the Multi-instance, Multi-ciphertext Setting
We construct an identity-based encryption (IBE) scheme that is tightly secure in a very strong sense. Specifically, we consider a setting with many...
-
Security enhanced privacy-preserving data aggregation scheme for intelligent transportation system
The intelligent transportation system can make traffic decisions through the sensory data collected by vehicles to ensure driving safety, improve...
-
Improving security performance of Internet of Medical Things using hybrid metaheuristic model
The security of the Internet of Medical Things (IoMT) is very important because it connects many medical devices to improve care operations and...
-
Device-specific security challenges and solution in IoT edge computing: a review
Rapid growth in IoT technology demands the need for the emergence of new IoT devices. IoT devices vary in terms of shape, size, storage, battery...
-
Heterogeneous IoT (HetIoT) security: techniques, challenges and open issues
The HetIoT is a new emergent technology widely used to offer QoS to applications such as health monitoring systems, agriculture 4.0, traffic...
-
Security-Aware Database Migration Planning
Database migration is an important problem faced by companies dealing with big data. Not only is migration a costly procedure, but it also involves...
-
Speech emotion recognition systems and their security aspects
Speech emotion recognition (SER) systems leverage information derived from sound waves produced by humans to identify the concealed emotions in...
-
Medical image security and authenticity via dual encryption
Since medical images include sensitive patient information, security is the top priority during transmission. In addition to protecting patient data...
-
Trustworthy machine learning in the context of security and privacy
Artificial intelligence-based algorithms are widely adopted in critical applications such as healthcare and autonomous vehicles. Mitigating the...
-
Artificial intelligence algorithms for cyberspace security applications: a technological and status review
Three technical problems should be solved urgently in cyberspace security: the timeliness and accuracy of network attack detection, the credibility...
-
Anonymity and security improvements in heterogeneous connected vehicle networks
The connected vehicle network is an important part of intelligent transportation since it provides a wide variety of online vehicle services and...
-
Survey: federated learning data security and privacy-preserving in edge-Internet of Things
The amount of data generated owing to the rapid development of the Smart Internet of Things is increasing exponentially. Traditional machine learning...
-
Modified lightweight GIFT cipher for security enhancement in resource-constrained IoT devices
The internet of things (IoT) ensures flexible network services to the end devices connected to it. Although security has always been a concern for...
-
Machine learning for food security: current status, challenges, and future perspectives
AbstractA significant amount of study has been conducted on food security forecasting, yet, few systematic reviews of the literature in this context...