Privacy-preserving cloud computing on sensitive data: A survey of methods, products and challenges
The increasing volume of personal and sensitive data being harvested by data controllers
makes it increasingly necessary to use the cloud not just to store the data, but also to …
makes it increasingly necessary to use the cloud not just to store the data, but also to …
Cryptographic approaches to authenticating synthetic DNA sequences
In a bioeconomy that relies on synthetic DNA sequences, the ability to ensure their
authenticity is critical. DNA watermarks can encode identifying data in short sequences and …
authenticity is critical. DNA watermarks can encode identifying data in short sequences and …
Security of satellite-terrestrial communications: Challenges and potential solutions
The integration of satellite and terrestrial networks has become inevitable in the next
generations of communications networks due to emerging needs of ubiquitous connectivity …
generations of communications networks due to emerging needs of ubiquitous connectivity …
Strengthen cloud computing security with federal identity management using hierarchical identity-based cryptography
More and more companies begin to provide different kinds of cloud computing services for
Internet users at the same time these services also bring some security problems. Currently …
Internet users at the same time these services also bring some security problems. Currently …
Lightweight encryption for smart home
Smart home is one of the most popular IoT (Internet of Things) applications, which connects
a wide variety of objects and home appliances in a single logical network. Smart home …
a wide variety of objects and home appliances in a single logical network. Smart home …
Multi-user broadcast authentication in wireless sensor networks
Broadcast authentication is a critical security service in wireless sensor networks (WSNs), as
it allows mobile users of WSNs to broadcast messages to multiple sensor nodes in a secure …
it allows mobile users of WSNs to broadcast messages to multiple sensor nodes in a secure …
On broadcast authentication in wireless sensor networks
Broadcast authentication is a critical security service in wireless sensor networks (WSNs),
since it enables users to broadcast the WSN in an authenticated way. Symmetric key based …
since it enables users to broadcast the WSN in an authenticated way. Symmetric key based …
Privacy-preserving aware data transmission for IoT-based e-health
Abstract Internet of Things (IoT) is an emerging networking paradigm that aims to improve
human daily life. It includes a huge number of interactive nodes that generate, aggregate …
human daily life. It includes a huge number of interactive nodes that generate, aggregate …
Towards a reputation-based routing protocol to contrast blackholes in a delay tolerant network
A Delay Tolerant Network (DTN) relies on the implicit assumption that nodes cooperate
towards message forwarding. However, this assumption cannot be satisfied when there are …
towards message forwarding. However, this assumption cannot be satisfied when there are …
Authentication, authorization, access control, and key exchange in internet of things
I Simsek - ACM Transactions on Internet of Things, 2024 - dl.acm.org
The Internet of Things (IoT) is a dynamic network of devices and infrastructure supporting
instances composed to platforms being based on cloud/fog and blockchain technologies. Its …
instances composed to platforms being based on cloud/fog and blockchain technologies. Its …