Towards insighting cybersecurity for healthcare domains: A comprehensive review of recent practices and trends
Volume 1, Issue , December 2023, Page
Share article
Secure authentication schemes in cloud computing with glimpse of artificial neural networks: A review
Volume 1, Issue , December 2023, Page
Share article
An efficient IoT group association and data sharing mechanism in edge computing paradigm
Volume 1, Issue , December 2023, Page
Share article
Bilinear pairing-based access control and key agreement scheme for smart transportation
Volume 1, Issue , December 2023, Page
Share article
Securing distributed systems: A survey on access control techniques for cloud, blockchain, IoT and SDN
Volume 1, Issue , December 2023, Page
Share article
Efficient time-oriented latency-based secure data encryption for cloud storage
Volume 2, Issue , January 2024, Page
Share article
Hybrid defense mechanism against malicious packet dropping attack for MANET using game theory
Volume 1, Issue , December 2023, Page
Share article
Cryptanalysis of Secure ECC-Based Three Factor Mutual Authentication Protocol for Telecare Medical Information System
Volume 1, Issue , December 2023, Page
Share article
Secure distributed data integrity auditing with high efficiency in 5G-enabled software-defined edge computing
Volume 1, Issue , December 2023, Page
Share article
A decentralised KYC based approach for microfinance using blockchain technology
Volume 1, Issue , December 2023, Page
Share article
Edge intelligent collaborative privacy protection solution for smart medical
Volume 1, Issue , December 2023, Page
Share article
A review of deep learning models to detect malware in Android applications
Volume 1, Issue , December 2023, Page
Share article
An advanced and secure framework for conducting online examination using blockchain method
Volume 1, Issue , December 2023, Page
Share article
Quantum communication with RLP quantum resistant cryptography in industrial manufacturing
Volume 1, Issue , December 2023, Page
Share article
Cyber security: State of the art, challenges and future directions
Volume 2, Issue , January 2024, Page
Share article
Secure session key pairing and a lightweight key authentication scheme for liable drone services
Volume 1, Issue , December 2023, Page
Share article
Blockchain-powered distributed data auditing scheme for cloud-edge healthcare system
Volume 1, Issue , December 2023, Page
Share article
PPT-LBS: Privacy-preserving top-k query scheme for outsourced data of location-based services
Volume 1, Issue , December 2023, Page
Share article
Colour image encryption algorithm using Rubik's cube scrambling with bitmap shuffling and frame rotation
Volume 2, Issue , January 2024, Page
Share article
Cryptanalysis on “a secure three-factor user authentication and key agreement protocol for TMIS with user anonymity ”
Volume 1, Issue , December 2023, Page
Share article
Sanitizable signature scheme with privacy protection for electronic medical data sharing
Volume 1, Issue , December 2023, Page
Share article
A secure and efficient DSSE scheme with constant storage costs in smart devices
Volume 1, Issue , December 2023, Page
Share article
Design of blockchain-enabled secure smart health monitoring system and its testbed implementation
Volume 1, Issue , December 2023, Page
Share article
A blockchain-based anonymous reporting system with no central authority: Architecture and protocol
Volume 2, Issue , January 2024, Page
Share article