We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 1-20 of 10,000 results
  1. Compact Structure-Preserving Signatures with Almost Tight Security

    In structure-preserving cryptography, every building block shares the same bilinear groups. These groups must be generated for a specific, a priori...

    Masayuki Abe, Dennis Hofheinz, ... Jiaxin Pan in Journal of Cryptology
    Article Open access 10 August 2023
  2. An artificial intelligence lightweight blockchain security model for security and privacy in IIoT systems

    The Industrial Internet of Things (IIoT) promises to deliver innovative business models across multiple domains by providing ubiquitous connectivity,...

    Shitharth Selvarajan, Gautam Srivastava, ... Jerry Chun-Wei Lin in Journal of Cloud Computing
    Article Open access 16 March 2023
  3. Quantum cryptography based cloud security model (QC-CSM) for ensuring cloud data security in storage and accessing

    In recent days, cloud computing is a universal computing and conventional paradigm, in which the resources are provided over the Internet based on...

    K. Sundar, S. Sasikumar, ... S. karthick in Multimedia Tools and Applications
    Article 24 April 2023
  4. Analysis of cyber security knowledge gaps based on cyber security body of knowledge

    Due to the increasing number of cyber incidents and overwhelming skills shortage, it is required to evaluate the knowledge gap between cyber security...

    Cagatay Catal, Alper Ozcan, ... Ahmet Kasif in Education and Information Technologies
    Article 05 August 2022
  5. An efficient security testing mechanism for Android Apps based on malware analysis and optimized XGBoost

    Security Testing of Android Applications is a difficult issue. Malicious apps are a threat to the Android platform's security. Traditional solutions...

    Pawan Kumar, Sukhdip Singh, Suman in Multimedia Tools and Applications
    Article 17 January 2024
  6. BPMN extension evaluation for security requirements engineering framework

    In this paper we present an in-depth evaluation of the Business Process Management Notation (BPMN) security extension. The evaluation mechanism is...

    Saima Zareen, Syed Muhammad Anwar in Requirements Engineering
    Article 24 May 2024
  7. Identity-Based Encryption with (Almost) Tight Security in the Multi-instance, Multi-ciphertext Setting

    We construct an identity-based encryption (IBE) scheme that is tightly secure in a very strong sense. Specifically, we consider a setting with many...

    Dennis Hofheinz, Jessica Koch, Christoph Striecks in Journal of Cryptology
    Article Open access 29 February 2024
  8. Security enhanced privacy-preserving data aggregation scheme for intelligent transportation system

    The intelligent transportation system can make traffic decisions through the sensory data collected by vehicles to ensure driving safety, improve...

    Kaizhong Zuo, **xi Chu, ... Zhangyi Shen in The Journal of Supercomputing
    Article 12 March 2024
  9. Improving security performance of Internet of Medical Things using hybrid metaheuristic model

    The security of the Internet of Medical Things (IoMT) is very important because it connects many medical devices to improve care operations and...

    Ashok Kanneboina, Gopikrishnan Sundaram in Multimedia Tools and Applications
    Article 18 April 2024
  10. Device-specific security challenges and solution in IoT edge computing: a review

    Rapid growth in IoT technology demands the need for the emergence of new IoT devices. IoT devices vary in terms of shape, size, storage, battery...

    Aditi Roy, J. Kokila, ... B. Shameedha Begum in The Journal of Supercomputing
    Article 17 June 2023
  11. Heterogeneous IoT (HetIoT) security: techniques, challenges and open issues

    The HetIoT is a new emergent technology widely used to offer QoS to applications such as health monitoring systems, agriculture 4.0, traffic...

    Shalaka S. Mahadik, Pranav M. Pawar, Raja Muthalagu in Multimedia Tools and Applications
    Article 29 September 2023
  12. Security-Aware Database Migration Planning

    Database migration is an important problem faced by companies dealing with big data. Not only is migration a costly procedure, but it also involves...

    Utku Umur Acikalin, Bugra Caskurlu, K. Subramani in Constraints
    Article 10 August 2023
  13. Speech emotion recognition systems and their security aspects

    Speech emotion recognition (SER) systems leverage information derived from sound waves produced by humans to identify the concealed emotions in...

    Itzik Gurowiec, Nir Nissim in Artificial Intelligence Review
    Article Open access 21 May 2024
  14. Medical image security and authenticity via dual encryption

    Since medical images include sensitive patient information, security is the top priority during transmission. In addition to protecting patient data...

    Kishore Babu Nampalle, Shriansh Manhas, Balasubramanian Raman in Applied Intelligence
    Article 19 April 2023
  15. Trustworthy machine learning in the context of security and privacy

    Artificial intelligence-based algorithms are widely adopted in critical applications such as healthcare and autonomous vehicles. Mitigating the...

    Ramesh Upreti, Pedro G. Lind, ... Anis Yazidi in International Journal of Information Security
    Article Open access 03 April 2024
  16. Artificial intelligence algorithms for cyberspace security applications: a technological and status review

    Three technical problems should be solved urgently in cyberspace security: the timeliness and accuracy of network attack detection, the credibility...

    Article 30 August 2023
  17. Anonymity and security improvements in heterogeneous connected vehicle networks

    The connected vehicle network is an important part of intelligent transportation since it provides a wide variety of online vehicle services and...

    S. A. Sivasankari, Deepak Gupta, ... Haewon Byeon in International Journal of Data Science and Analytics
    Article 16 January 2024
  18. Survey: federated learning data security and privacy-preserving in edge-Internet of Things

    The amount of data generated owing to the rapid development of the Smart Internet of Things is increasing exponentially. Traditional machine learning...

    Haiao Li, Lina Ge, Lei Tian in Artificial Intelligence Review
    Article Open access 29 April 2024
  19. Modified lightweight GIFT cipher for security enhancement in resource-constrained IoT devices

    The internet of things (IoT) ensures flexible network services to the end devices connected to it. Although security has always been a concern for...

    Nilufar Yasmin, Richa Gupta in International Journal of Information Technology
    Article 11 September 2023
  20. Machine learning for food security: current status, challenges, and future perspectives

    Abstract

    A significant amount of study has been conducted on food security forecasting, yet, few systematic reviews of the literature in this context...

    Noureddine Jarray, Ali Ben Abbes, Imed Riadh Farah in Artificial Intelligence Review
    Article 27 October 2023
Did you find what you were looking for? Share feedback.