Secret sharing: A comprehensive survey, taxonomy and applications
The emergence of ubiquitous computing and different disruptive technologies caused
magnificent development in information and communication technology. Likewise …
magnificent development in information and communication technology. Likewise …
Privacy preservation models for third-party auditor over cloud computing: A survey
Cloud computing has become a prominent technology due to its important utility service; this
service concentrates on outsourcing data to organizations and individual consumers. Cloud …
service concentrates on outsourcing data to organizations and individual consumers. Cloud …
A secure three factor based authentication scheme for health care systems using IoT enabled devices
In recent years, the Internet of Things (IoT) has gained increasing popularity due to the
usage of Internet-enabled devices. However, Internet-enabled devices, also known as smart …
usage of Internet-enabled devices. However, Internet-enabled devices, also known as smart …
Proud: Verifiable privacy-preserving outsourced attribute based signcryption supporting access policy update for cloud assisted iot applications
The ever-growing number of Internet connected devices poses several cybersecurity risks.
Most of the exchanged data between the Internet of Things (IoT) devices are not adequately …
Most of the exchanged data between the Internet of Things (IoT) devices are not adequately …
A bio-inspired privacy-preserving framework for healthcare systems
Wireless computing has revolutionized our life with the technological advancement from the
traditional networking into a new epoch for communication in ad hoc decorum. An energy …
traditional networking into a new epoch for communication in ad hoc decorum. An energy …
A review on cybersecurity of cloud computing for supporting connected vehicle applications
In an Internet of Things (IoT) environment, cloud computing is emerging as a technologically
feasible and economically viable solution for supporting real-time and non-real-time …
feasible and economically viable solution for supporting real-time and non-real-time …
Multiauthority access control with anonymous authentication for personal health record
L Zhang, Y Ye, Y Mu - IEEE Internet of Things Journal, 2020 - ieeexplore.ieee.org
A personal health record (PHR) system is a smart health system that serves patients and
doctors. A PHR is usually stored in a cloud and managed by a semitrusted cloud provider …
doctors. A PHR is usually stored in a cloud and managed by a semitrusted cloud provider …
Secret image sharing schemes: A comprehensive survey
The safeguarding of digitized data against unwanted access and modification has become
an issue of utmost importance as a direct result of the rapid development of network …
an issue of utmost importance as a direct result of the rapid development of network …
Privacy-preserving distributed data access control for CloudIoT
The Edge-Fog-Cloud interplay in the Internet-of-Things (IoT) leads to many exciting data-
sharing applications that use access control systems as primary requirements. To ensure a …
sharing applications that use access control systems as primary requirements. To ensure a …
A flexible attribute based data access management scheme for sensor-cloud system
H Hong, Z Sun - Journal of Systems Architecture, 2021 - Elsevier
Sensor-cloud combines the merits of WSN with cloud computing and has been deployed in
many practical applications. Data security is the prerequisite for the implementation of a …
many practical applications. Data security is the prerequisite for the implementation of a …