[PDF][PDF] Secured web application based on CapsuleNet and OWASP in the cloud

R Vallabhaneni, S Pillai, SA Vaddadi… - Indonesian Journal of …, 2024 - researchgate.net
The tremendous use of sensitive and consequential information in the advanced web
application confronts the security issues. To defend the web application while it processing …

Efficient and privacy-preserving online diagnosis scheme based on federated learning in e-healthcare system

G Shen, Z Fu, Y Gui, W Susilo, M Zhang - Information Sciences, 2023 - Elsevier
Electronic healthcare (e-healthcare) system has brought great convenience for people to
seek medical treatment. However, data security, user privacy and online diagnosis efficiency …

An efficient approach for enhancing security in Internet of Things using the optimum authentication key

G Kalyani, S Chaudhari - International Journal of Computers and …, 2020 - Taylor & Francis
Nowadays, Internet of Things (IoT) is turning into an attractive framework to drive a
substantive jump on merchandise and enterprises through physical, digital, and social …

CREDO: Efficient and privacy-preserving multi-level medical pre-diagnosis based on ML-kNN

D Zhu, H Zhu, X Liu, H Li, F Wang, H Li, D Feng - Information Sciences, 2020 - Elsevier
With the promotion of online medical pre-diagnosis system, more and more research has
begun to pay attention to the issue of privacy, and existing privacy-preserving schemes are …

Quantum homomorphic encryption scheme with flexible number of evaluator based on (k, n)-threshold quantum state sharing

XB Chen, YR Sun, G Xu, YX Yang - Information Sciences, 2019 - Elsevier
Quantum homomorphic encryption provides the ability to perform calculations on encrypted
data without decrypting them. The number of evaluators in most previous schemes is 1, and …

A comparative assessment of homomorphic encryption algorithms applied to biometric information

G Crihan, M Crăciun, L Dumitriu - Inventions, 2023 - mdpi.com
This paper provides preliminary research regarding the implementation and evaluation of a
hybrid mechanism of authentication based on fingerprint recognition interconnected with …

Highly Secure Privacy‐Preserving Outsourced k‐Means Clustering under Multiple Keys in Cloud Computing

Y Zou, Z Zhao, S Shi, L Wang, Y Peng… - Security and …, 2020 - Wiley Online Library
Data clustering is the unsupervised classification of data records into groups. As one of the
steps in data analysis, it has been widely researched and applied in practical life, such as …

Privacy preserving similarity joins using MapReduce

X Ding, W Yang, KKR Choo, X Wang, H ** - Information Sciences, 2019 - Elsevier
Similarity join is an essential operator in data processing, mining and analysis. However, it is
resource intensive and time consuming, particularly when processing big data. There is also …

ePMLF: Efficient and Privacy‐Preserving Machine Learning Framework Based on Fog Computing

R Zhao, Y **e, H Cheng, X Jia… - International Journal of …, 2023 - Wiley Online Library
With the continuous improvement of computation and communication capabilities, the
Internet of Things (IoT) plays a vital role in many intelligent applications. Therefore, IoT …

EC(DH)2: an effective secured data storage mechanism for cloud based IoT applications using elliptic curve and Diffie-Hellman

BP Kavin, S Ganapathy - International Journal of Internet …, 2020 - inderscienceonline.com
In the rapid growth of cloud computing with internet of things (IoT) technology utilisation in
this fast world, security is an essential issue in cloud data storage and access the encrypted …