Privacy-preserving cloud computing on sensitive data: A survey of methods, products and challenges

J Domingo-Ferrer, O Farras, J Ribes-González… - Computer …, 2019 - Elsevier
The increasing volume of personal and sensitive data being harvested by data controllers
makes it increasingly necessary to use the cloud not just to store the data, but also to …

Cryptographic approaches to authenticating synthetic DNA sequences

CT Berezin, S Peccoud, DM Kar, J Peccoud - Trends in Biotechnology, 2024 - cell.com
In a bioeconomy that relies on synthetic DNA sequences, the ability to ensure their
authenticity is critical. DNA watermarks can encode identifying data in short sequences and …

Security of satellite-terrestrial communications: Challenges and potential solutions

I Ahmad, J Suomalainen, P Porambage, A Gurtov… - IEEE …, 2022 - ieeexplore.ieee.org
The integration of satellite and terrestrial networks has become inevitable in the next
generations of communications networks due to emerging needs of ubiquitous connectivity …

Strengthen cloud computing security with federal identity management using hierarchical identity-based cryptography

L Yan, C Rong, G Zhao - IEEE international conference on cloud …, 2009 - Springer
More and more companies begin to provide different kinds of cloud computing services for
Internet users at the same time these services also bring some security problems. Currently …

Lightweight encryption for smart home

S Al Salami, J Baek, K Salah… - 2016 11th International …, 2016 - ieeexplore.ieee.org
Smart home is one of the most popular IoT (Internet of Things) applications, which connects
a wide variety of objects and home appliances in a single logical network. Smart home …

Multi-user broadcast authentication in wireless sensor networks

K Ren, S Yu, W Lou, Y Zhang - IEEE Transactions on Vehicular …, 2009 - ieeexplore.ieee.org
Broadcast authentication is a critical security service in wireless sensor networks (WSNs), as
it allows mobile users of WSNs to broadcast messages to multiple sensor nodes in a secure …

On broadcast authentication in wireless sensor networks

K Ren, W Lou, K Zeng, PJ Moran - IEEE Transactions on …, 2007 - ieeexplore.ieee.org
Broadcast authentication is a critical security service in wireless sensor networks (WSNs),
since it enables users to broadcast the WSN in an authenticated way. Symmetric key based …

Privacy-preserving aware data transmission for IoT-based e-health

R Boussada, B Hamdane, ME Elhdhili, LA Saidane - Computer Networks, 2019 - Elsevier
Abstract Internet of Things (IoT) is an emerging networking paradigm that aims to improve
human daily life. It includes a huge number of interactive nodes that generate, aggregate …

Towards a reputation-based routing protocol to contrast blackholes in a delay tolerant network

G Dini, AL Duca - Ad Hoc Networks, 2012 - Elsevier
A Delay Tolerant Network (DTN) relies on the implicit assumption that nodes cooperate
towards message forwarding. However, this assumption cannot be satisfied when there are …

Authentication, authorization, access control, and key exchange in internet of things

I Simsek - ACM Transactions on Internet of Things, 2024 - dl.acm.org
The Internet of Things (IoT) is a dynamic network of devices and infrastructure supporting
instances composed to platforms being based on cloud/fog and blockchain technologies. Its …