Most Cited Articles

Open access

ISSN: 2772-9184

Towards insighting cybersecurity for healthcare domains: A comprehensive review of recent practices and trends

Share article

Secure authentication schemes in cloud computing with glimpse of artificial neural networks: A review

Share article

An efficient IoT group association and data sharing mechanism in edge computing paradigm

Share article

Bilinear pairing-based access control and key agreement scheme for smart transportation

Share article

Securing distributed systems: A survey on access control techniques for cloud, blockchain, IoT and SDN

Share article

Efficient time-oriented latency-based secure data encryption for cloud storage

Share article

Hybrid defense mechanism against malicious packet dropping attack for MANET using game theory

Share article

Cryptanalysis of Secure ECC-Based Three Factor Mutual Authentication Protocol for Telecare Medical Information System

Share article

Secure distributed data integrity auditing with high efficiency in 5G-enabled software-defined edge computing

Share article

A decentralised KYC based approach for microfinance using blockchain technology

Share article

Edge intelligent collaborative privacy protection solution for smart medical

Share article

A review of deep learning models to detect malware in Android applications

Share article

An advanced and secure framework for conducting online examination using blockchain method

Share article

Quantum communication with RLP quantum resistant cryptography in industrial manufacturing

Share article

Cyber security: State of the art, challenges and future directions

Share article

Secure session key pairing and a lightweight key authentication scheme for liable drone services

Share article

Blockchain-powered distributed data auditing scheme for cloud-edge healthcare system

Share article

PPT-LBS: Privacy-preserving top-k query scheme for outsourced data of location-based services

Share article

Colour image encryption algorithm using Rubik's cube scrambling with bitmap shuffling and frame rotation

Share article

Cryptanalysis on “a secure three-factor user authentication and key agreement protocol for TMIS with user anonymity ”

Share article

Sanitizable signature scheme with privacy protection for electronic medical data sharing

Share article

A secure and efficient DSSE scheme with constant storage costs in smart devices

Share article

Design of blockchain-enabled secure smart health monitoring system and its testbed implementation

Share article

A blockchain-based anonymous reporting system with no central authority: Architecture and protocol

Share article

Stay Informed

Register your interest and receive email alerts tailored to your needs. Sign up below.