Search
Search Results
-
A Novel Secure Vector Product for Protecting the Privacy of Data in Vertically Partitioned Dataset
The contemporary advancements in the field of data collecting, storage and networking have resulted in data being saved and kept at many locations.... -
An Extended Wavelet Based Federated Convolutional Quotient Multipixel Value Differencing for Secured Data Transmission Outline
In a distributed communication channel, the safety of photographic files is a challenging task. To protect the image information, various approaches...
-
A Φ-Differential Privacy Scheme for Incentive-Based Demand Response in Smart Grid
Smart meters are devices that facilitate the collection of energy consumption data in almost real-time for individual users. Smart grids rely on... -
An Overview of Text Steganalysis
With the rapid development of the Internet, network information security is progressively under menace. Text steganography is one of the key reasons... -
Hardware-Based Authentication Applications
Authentication is one of the most fundamental problems in computer security. Implementation of any authentication and authorization protocol requires... -
State-of-the-Art Survey of Quantum Cryptography
In today Internet era, confidential information transmitted over an insecure channel. With the significant development in the area of quantum...
-
BCVSE: Verifiable Searchable Encryption Scheme With Blockchain Supporting Fuzzy Query
In new generation of Internet applications such as smart healthcare and digital finance, sharing data to gain its value has become popular. However,...
-
Challenges in making blockchain privacy compliant for the digital world: some measures
Due to the pandemic, most of the personal transactions relating to finance, commerce and healthcare services have gone online making privacy...
-
Fedlabx: a practical and privacy-preserving framework for federated learning
Federated learning (FL) draws attention in academia and industry due to its privacy-preserving capability in training machine learning models....
-
Cloud-based email phishing attack using machine and deep learning algorithm
Cloud computing refers to the on-demand availability of personal computer system assets, specifically data storage and processing power, without the...
-
A Proposal of Blockchain and NFC-Based Electronic Voting System
One of the most significant ways for a community to make a decision and the most democratic event in today’s countries is voting. Therefore,... -
Develo** a Safer Educational Environment that Preserves Users’ Privacy
This study proposes an e-attendance system that improves students’ safety and preserves user privacy and children's rights. The system provides an... -
An improved lattice based certificateless data integrity verification techniques for cloud computing
Today, cloud computing security schemes face many challenges, risks, and pitfalls. Digital signatures are vital security measures that must not be...
-
HCAC-EHR: hybrid cryptographic access control for secure EHR retrieval in healthcare cloud
Technology that is perfect is free of vulnerability. Technological growth offers users online data storage and access to it from anywhere. Cloud...
-
Enhancing Privacy in VANET Through Attribute-Based Encryption and Blockchain Integration: Uncovering the Benefits and Challenges
With the popularity of blockchain innovation, data security has become a concern. The blockchain framework is transparent and immutable, but its... -
Novel Smart Homecare IoT System with Edge-AI and Blockchain
Healthcare data is sensitive information that demands security and confidentiality. Currently, remote monitoring is widely applied as it provides... -
Quantum Technologies I: Information, Communication, and Computation
In this chapter, we introduce some of the notions of quantum information science including aspects of information, information security, entanglement... -
Intelligent Heuristic Keyword-Based Search Methodologies Applied to Cryptographic Cloud Environment
Cloud computing is now considered as one of the very important part in information technology. Relying on data transferred to a cloud server has been... -
Design and Implementation of Verifiable Blockchain-Based e-voting System
Voting is the most representative way to express individual decision making in a democratic society. The classic voting method requires a lot of... -
Blockchain-Integrated Secure Framework for Enhanced E-Government Services
As the digital transformation of public services intensifies, e-government systems face significant challenges in identity verification and data...