We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 1-20 of 391 results
  1. An innovative privacy preservation and security framework with fog nodes in enabled vanet system using hybrid encryption techniques

    Effective communication between smart transportation and smart vehicles is carried out using Vehicular Ad-Hoc Networks (VANETs). Here, the VANET...

    M. S. Minu, P. Jona Innisai Rani, ... A. Rajesh in Peer-to-Peer Networking and Applications
    Article 18 April 2024
  2. Optimization algorithms in security and privacy-preserving data disturbance for collaborative edge computing social IoT deep learning architectures

    Edge computing is an innovative solution to cloud computing’s IoT application support issues. Due to network instability and increased attack...

    Mythili Boopathi, Sachin Gupta, ... Arvind Kumar Pandey in Soft Computing
    Article 25 May 2023
  3. An Efficient Q-KPABE Framework to Enhance Cloud-Based IoT Security and Privacy

    The Key Policy Attribute-based Encryption (KPABE) standard arises as the utmost appropriate security system for public key encipherment. KP-ABE has...

    Kranthi Kumar Singamaneni, Anil Kumar Budati, Thulasi Bikku in Wireless Personal Communications
    Article 13 March 2024
  4. Fog computing-based IoT-enabled system security for electrical vehicles in the smart grid

    Wireless sensor networks (WSNs) face significant challenges related to dependability, integrity, and confidentiality due to their widespread...

    Sanjay Kumar Sonker, Vibha Kaw Raina, ... Ramesh C. Bansal in Electrical Engineering
    Article 09 February 2024
  5. An Efficient Security Testing for Android Application Based on Behavior and Activities Using Improved PCA and DNN-KNN Classifier

    Privacy and the safety of users are seriously threatened by Android, a mobile operating system that is becoming more and more popular. Due to the...

    Pawan Kumar, Sukhdip Singh in Wireless Personal Communications
    Article 01 March 2024
  6. ERNSS-MCC: Efficient relay node selection scheme for mission critical communication using machine learning in VANET

    In recent days, vehicular ad hoc networks (VANET) is advanced in communication paradigm, safety, and intelligent-based technique for message...

    A. Anu Monisha, T. R. Reshmi, K. Murugan in Peer-to-Peer Networking and Applications
    Article 26 May 2023
  7. Privacy-aware access control (PAAC)-based biometric authentication protocol (Bap) for mobile edge computing environment

    Since ancient times, privacy is being a greater issue. However, its impact on a subject where its significance is readily apparent has been...

    G. Reshma, B. T. Prasanna, ... M. Sangeetha in Soft Computing
    Article 28 April 2023
  8. Survey on Joint Paradigm of 5G and SDN Emerging Mobile Technologies: Architecture, Security, Challenges and Research Directions

    Modern communication systems are probable to surface new challenges while introducing innovative fronts concerning context consciousness in wireless...

    Syed Hussain Ali Kazmi, Faizan Qamar, ... Bhawani Shankar Chowdhry in Wireless Personal Communications
    Article 19 April 2023
  9. Security-aware IoT botnet attack detection framework using dilated and cascaded deep learning mechanism with conditional adversarial autoencoder-based features

    The “Internet of Things (IoT)” technology has been utilized in various industries in the past few years. As the IoT technology has diverse and small...

    N. Sakthipriya, V. Govindasamy, V. Akila in Peer-to-Peer Networking and Applications
    Article 23 February 2024
  10. Modular Encryption Standard to Improve Security of Health Information in Mobile Cloud Computing

    Despite the numerous and visible benefits of mobile cloud computing (MCC) in medical care, its advancement is hampered by protection and security...
    S. Varadhaganapathy, P. K. Deepak Kumar, ... Kalki Arun in Proceedings of Third Doctoral Symposium on Computational Intelligence
    Conference paper 2023
  11. Cloud data transmission based on security and improved routing through hybrid machine learning techniques

    A shared environment and the computer paradigm are combined in cloud computing (CC), enabling multiple users to access services and resources. This...

    Shamimul Qamar, Mohd Amaan, ... Shadab Alam in Soft Computing
    Article 16 May 2023
  12. IoT Data Stream Handling, Analysis, Communication and Security Issues: A Systematic Survey

    Massive data management or data stream handling has become a prominent study topic as a result of recent breakthroughs in the Internet of Things...

    Sanjay Patidar, Neetesh Kumar, Rajni **dal in Wireless Personal Communications
    Article 20 May 2024
  13. Enhanced security for IoT networks: a hybrid optimized learning model for intrusion classification

    The Internet of Things (IoT) features multiple device connectivity and breaks the conventional network connectivity limitations like limited wireless...

    S Rajarajan, M G Kavitha in Sādhanā
    Article 18 May 2024
  14. Data Security and Privacy in 5G-Enabled IoT

    Internet is a major communication medium for sharing data, audios, videos for various services like retrieval of information, online shop**, video...
    Darpan Anand, Vineeta Khemchandani in Blockchain for 5G-Enabled IoT
    Chapter 2021
  15. Computation Infrastructure: Data Offloading, Processing, and Privacy

    This chapter elaborates the computation infrastructure, namely, cloud, fog, and edge computing. Various kinds of data offloading mechanisms and a...
    Yasasvitha Koganti, Ramnarayan Yadav, ... Manish Chaturvedi in Recent Advancements in ICT Infrastructure and Applications
    Chapter 2022
  16. Survey of IoT Security: Application Areas, Threats and Solutions

    The current communication era is commonly called the Internet of Things (IoT). The IoT facilitates data generation, reception, and transmission among...
    Galiveeti Poornima, Y. Sudha, R. Pallavi in Communication Technologies and Security Challenges in IoT
    Chapter 2024
  17. Security and Energy Efficiency Enhancement for the Internet of Things: Challenges, Architecture and Future Research

    Thanks to constantly advancing technology, the world is changing rapidly. One such idea that has contributed to the reality of automation is the...
    Ritu Dewan, Tapsi Nagpal, ... Sardar M. N. Islam in Data Science and Network Engineering
    Conference paper 2024
  18. Attacks and Threats Verification Based on 4G/5G Security Architecture

    5G networks are in high demand and are expected to transform many industries, including finance, healthcare, transportation, and entertainment,...
    Lie Yang, Chien-Erh Weng, ... Yung-Cheng Yao in Innovative Mobile and Internet Services in Ubiquitous Computing
    Conference paper 2023
  19. End-to-end privacy preserving deep learning on multi-institutional medical imaging

    Using large, multi-national datasets for high-performance medical imaging AI systems requires innovation in privacy-preserving machine learning so...

    Georgios Kaissis, Alexander Ziller, ... Rickmer Braren in Nature Machine Intelligence
    Article 24 May 2021
  20. A survey of research on computation offloading in mobile cloud computing

    Mobile devices (MDs), represented by smartphones, have been widely used in various industries. However, MDs are constrained by their limited...

    ** Chen in Wireless Networks
    Article 06 March 2022
Did you find what you were looking for? Share feedback.