Secure authentication schemes in cloud computing with glimpse of artificial neural networks: A review
December 2023
The fast growth of the cloud computing technology has led to immense development in the public and private sectors. Cloud computing provides a high level of virtualization, massive scalability, multitenancy...
Share article
An efficient IoT group association and data sharing mechanism in edge computing paradigm
December 2023
Despite its benefits and promising future, security and privacy challenges for the IoT wireless communication of edge computing environment remain unaddressed. As a result, proper authentication mechanisms...
Share article
Bilinear pairing-based access control and key agreement scheme for smart transportation
December 2023
•Designed a new remote access control mechanism as a countermeasure to security issues in smart transportation.•The proposed scheme offers remote online registration of vehicles via the trusted authority...
Share article
Secure distributed data integrity auditing with high efficiency in 5G-enabled software-defined edge computing
December 2023
•The paradigm of the certificateless cryptography is used to design the proposed scheme, which highly eliminates the computational cost of the terminal side in the generation of security keys and tags.•The...
Share article
An advanced and secure framework for conducting online examination using blockchain method
December 2023
Nowadays, the online platform has been used by many educational institutions, to conduct tests, especially for secondary to tertiary level students. The most popular online test program is run by providing...
Share article
A secure and efficient DSSE scheme with constant storage costs in smart devices
December 2023
•To meet the needs of smart devices, we design our update protocol to decrease smart device’s storage cost to a constant.•We propose a novel index structure called RC-II which achieves search control.•We...
Share article
PPT-LBS: Privacy-preserving top-k query scheme for outsourced data of location-based services
December 2023
Location-based service (LBS) is enjoying a great popularity with the fast growth of mobile Internet. As the volume of data increases dramatically, an increasing number of location service providers...
Share article
A decentralised KYC based approach for microfinance using blockchain technology
December 2023
•The proposed lending model eliminates the middle parties like banks in the loan process. It decreases the time taken to a great extent.•The proposed decentralised KYC model eliminates a lot of human...
Share article
Cryptanalysis on “a secure three-factor user authentication and key agreement protocol for TMIS with user anonymity ”
December 2023
The health-care delivery services were made possible by telecare medicine information systems (TMIS). These systems are paving the way for a world where computerised telecare facilities and automated...
Share article
Edge intelligent collaborative privacy protection solution for smart medical
December 2023
In the era of big data, competent medical care has entered people’s lives. However, the existing intelligent diagnosis models have low accuracy and poor universality. At the same time, there is a risk...
Share article
Hybrid defense mechanism against malicious packet dropping attack for MANET using game theory
December 2023
Ad hoc networks are a new perspective of wireless communication for versatile hosts. Security is a colossal worry for ad hoc networks, especially for those security-touchy applications. The huge highlights...
Share article
Secure session key pairing and a lightweight key authentication scheme for liable drone services
December 2023
Recent advancements in drone technology have created new application opportunities, particularly for small drones. However, these advancements raise concerns about security, adaptability, and consistency....
Share article
Cryptanalysis of Secure ECC-Based Three Factor Mutual Authentication Protocol for Telecare Medical Information System
December 2023
Telecare Medical Information System (TMIS) is gaining importance in the present COVID-19 crisis. TMIS as a technology, offers patients a range of remote medical services, incorporated into Wireless...
Share article
A review of deep learning models to detect malware in Android applications
December 2023
Android applications are indispensable resources that facilitate communication, health monitoring, planning, data sharing and synchronization, social interaction, business and financial transactions....
Share article
Towards insighting cybersecurity for healthcare domains: A comprehensive review of recent practices and trends
December 2023
Healthcare information security is becoming a significant responsibility for all healthcare organisations and individuals. Innovative medical equipment and healthcare apps are vital to patient care,...
Share article
Securing distributed systems: A survey on access control techniques for cloud, blockchain, IoT and SDN
December 2023
•Reviews the current state-of-the-art access control deployed in businesses.•Reviews emerging and innovating access control in recent literature.•Applies access control to four domains: cloud, IoT,...
Share article
Blockchain-powered distributed data auditing scheme for cloud-edge healthcare system
December 2023
•A distributed data integrity verification method without third-party auditor is proposed. Based on the constructed hashTable, each hospital server can audit the data in a distributed manner.•A blockchain-based...
Share article
Sanitizable signature scheme with privacy protection for electronic medical data sharing
December 2023
•Propose a typical system model of electronic medical data sharing scenarios that is closer to practical applications.•Present a SSPM scheme which can meet the actual security needs in the electronic...
Share article
Quantum communication with RLP quantum resistant cryptography in industrial manufacturing
December 2023
This paper presents the best outcome of the Quantum communication use case of industrial manufacturing, using quantum theory to achieve secure data transfer between industrial production facilities...
Share article
Design of blockchain-enabled secure smart health monitoring system and its testbed implementation
December 2023
•In this paper, an architecture of the blockchain-enabled secure smart health monitoring system is proposed (in short BSSHM).•The threat model related to the BSSHM is also provided.•The formal security...
Share article