Recent Articles

Open access

ISSN: 2772-9184

Secure authentication schemes in cloud computing with glimpse of artificial neural networks: A review

The fast growth of the cloud computing technology has led to immense development in the public and private sectors. Cloud computing provides a high level of virtualization, massive scalability, multitenancy...

Share article

An efficient IoT group association and data sharing mechanism in edge computing paradigm

Despite its benefits and promising future, security and privacy challenges for the IoT wireless communication of edge computing environment remain unaddressed. As a result, proper authentication mechanisms...

Share article

Bilinear pairing-based access control and key agreement scheme for smart transportation

•Designed a new remote access control mechanism as a countermeasure to security issues in smart transportation.•The proposed scheme offers remote online registration of vehicles via the trusted authority...

Share article

Secure distributed data integrity auditing with high efficiency in 5G-enabled software-defined edge computing

•The paradigm of the certificateless cryptography is used to design the proposed scheme, which highly eliminates the computational cost of the terminal side in the generation of security keys and tags.•The...

Share article

An advanced and secure framework for conducting online examination using blockchain method

Nowadays, the online platform has been used by many educational institutions, to conduct tests, especially for secondary to tertiary level students. The most popular online test program is run by providing...

Share article

A secure and efficient DSSE scheme with constant storage costs in smart devices

•To meet the needs of smart devices, we design our update protocol to decrease smart device’s storage cost to a constant.•We propose a novel index structure called RC-II which achieves search control.•We...

Share article

PPT-LBS: Privacy-preserving top-k query scheme for outsourced data of location-based services

Location-based service (LBS) is enjoying a great popularity with the fast growth of mobile Internet. As the volume of data increases dramatically, an increasing number of location service providers...

Share article

A decentralised KYC based approach for microfinance using blockchain technology

•The proposed lending model eliminates the middle parties like banks in the loan process. It decreases the time taken to a great extent.•The proposed decentralised KYC model eliminates a lot of human...

Share article

Cryptanalysis on “a secure three-factor user authentication and key agreement protocol for TMIS with user anonymity ”

The health-care delivery services were made possible by telecare medicine information systems (TMIS). These systems are paving the way for a world where computerised telecare facilities and automated...

Share article

Edge intelligent collaborative privacy protection solution for smart medical

In the era of big data, competent medical care has entered people’s lives. However, the existing intelligent diagnosis models have low accuracy and poor universality. At the same time, there is a risk...

Share article

Hybrid defense mechanism against malicious packet dropping attack for MANET using game theory

Ad hoc networks are a new perspective of wireless communication for versatile hosts. Security is a colossal worry for ad hoc networks, especially for those security-touchy applications. The huge highlights...

Share article

Secure session key pairing and a lightweight key authentication scheme for liable drone services

Recent advancements in drone technology have created new application opportunities, particularly for small drones. However, these advancements raise concerns about security, adaptability, and consistency....

Share article

Cryptanalysis of Secure ECC-Based Three Factor Mutual Authentication Protocol for Telecare Medical Information System

Telecare Medical Information System (TMIS) is gaining importance in the present COVID-19 crisis. TMIS as a technology, offers patients a range of remote medical services, incorporated into Wireless...

Share article

A review of deep learning models to detect malware in Android applications

Android applications are indispensable resources that facilitate communication, health monitoring, planning, data sharing and synchronization, social interaction, business and financial transactions....

Share article

Towards insighting cybersecurity for healthcare domains: A comprehensive review of recent practices and trends

Healthcare information security is becoming a significant responsibility for all healthcare organisations and individuals. Innovative medical equipment and healthcare apps are vital to patient care,...

Share article

Securing distributed systems: A survey on access control techniques for cloud, blockchain, IoT and SDN

•Reviews the current state-of-the-art access control deployed in businesses.•Reviews emerging and innovating access control in recent literature.•Applies access control to four domains: cloud, IoT,...

Share article

Blockchain-powered distributed data auditing scheme for cloud-edge healthcare system

•A distributed data integrity verification method without third-party auditor is proposed. Based on the constructed hashTable, each hospital server can audit the data in a distributed manner.•A blockchain-based...

Share article

Sanitizable signature scheme with privacy protection for electronic medical data sharing

•Propose a typical system model of electronic medical data sharing scenarios that is closer to practical applications.•Present a SSPM scheme which can meet the actual security needs in the electronic...

Share article

Quantum communication with RLP quantum resistant cryptography in industrial manufacturing

This paper presents the best outcome of the Quantum communication use case of industrial manufacturing, using quantum theory to achieve secure data transfer between industrial production facilities...

Share article

Design of blockchain-enabled secure smart health monitoring system and its testbed implementation

•In this paper, an architecture of the blockchain-enabled secure smart health monitoring system is proposed (in short BSSHM).•The threat model related to the BSSHM is also provided.•The formal security...

Share article

Stay Informed

Register your interest and receive email alerts tailored to your needs. Sign up below.