Cybersecurity in the AI-Based metaverse: A survey
The Metaverse is a multi-user virtual world that combines physical reality with digital virtual
reality. The three basic technologies for building the Metaverse are immersive technologies …
reality. The three basic technologies for building the Metaverse are immersive technologies …
Smart contract-enabled secure sharing of health data for a mobile cloud-based e-health system
Healthcare comprises the largest revenue and data boom markets. Sharing knowledge
about healthcare is crucial for research that can help healthcare providers and patients …
about healthcare is crucial for research that can help healthcare providers and patients …
Systematic survey: secure and privacy-preserving big data analytics in cloud
Massive data are being generated exponentially every day. Therefore, analytics over data is
inevitable nowadays to gain meaningful insights. Big Data Analytics (BDA) is powerful in …
inevitable nowadays to gain meaningful insights. Big Data Analytics (BDA) is powerful in …
A lightweight security model for ensuring patient privacy and confidentiality in telehealth applications
Telehealth, a cornerstone of Healthcare 4.0 has widespread adoption owing to its
convenience and efficiency. However, the secure transmission of patient records over the …
convenience and efficiency. However, the secure transmission of patient records over the …
Secured and privacy-preserving multi-authority access control system for cloud-based healthcare data sharing
With continuous advancements in Internet technology and the increased use of
cryptographic techniques, the cloud has become the obvious choice for data sharing …
cryptographic techniques, the cloud has become the obvious choice for data sharing …
A K-SVD based compressive sensing method for visual chaotic image encryption
The visually secure image encryption scheme is an effective image encryption method,
which embeds an encrypted image into a visual image to realize a secure and secret image …
which embeds an encrypted image into a visual image to realize a secure and secret image …
Dynamic secure access control and data sharing through trusted delegation and revocation in a blockchain-enabled cloud-IoT environment
The Internet of Things (IoT) is vulnerable to leakage of private information during data
sharing. To avoid this problem, access control and secure data sharing have been …
sharing. To avoid this problem, access control and secure data sharing have been …
A security framework to enhance IoT device identity and data access through blockchain consensus model
K Janani, S Ramamoorthy - Cluster Computing, 2024 - Springer
In today's technology landscape, the Internet of Things (IoT) has gained significant
momentum due to its wide-ranging applications across diverse devices. However, the …
momentum due to its wide-ranging applications across diverse devices. However, the …
Hybrid lightweight cryptography with attribute-based encryption standard for secure and scalable IoT system
ABSTRACT Internet of Things (IoT) devices require lower power consumption with higher
security, which can be achieved by using lightweight cryptography (LWC) approaches …
security, which can be achieved by using lightweight cryptography (LWC) approaches …
ZEBRA: Zero Trust Architecture Employing Blockchain Technology and ROPUF for AMI Security
F Alsulami, AR Kulkarni, NA Hazari, M Niamat - IEEE Access, 2024 - ieeexplore.ieee.org
Smart grid (SG) has evolved as a recent topic of discussion and research globally, due to the
integration of communication and internet in its network. It facilitates the bidirectional flow of …
integration of communication and internet in its network. It facilitates the bidirectional flow of …