Comparison of named data networking mobility methodology in a merged cloud internet of things and artificial intelligence environment
In-network caching has evolved into a new paradigm, paving the way for the creation of
Named Data Networking (NDN). Rather than simply being typical Internet technology, NDN …
Named Data Networking (NDN). Rather than simply being typical Internet technology, NDN …
Hybridchain: A novel architecture for confidentiality-preserving and performant permissioned blockchain using trusted execution environment
Y Wang, J Li, S Zhao, F Yu - IEEE access, 2020 - ieeexplore.ieee.org
Blockchain is making headlines due to it promises to provide a decentralized, transparent,
tamper-resistant, traceable and verifiable historical transaction records that can resist faults …
tamper-resistant, traceable and verifiable historical transaction records that can resist faults …
A blockchain-based and SGX-enabled access control framework for IoT
J Han, Y Zhang, J Liu, Z Li, M **an, H Wang, F Mao… - Electronics, 2022 - mdpi.com
With the rapid development of physical networks, tens of billions of Internet of Things (IoT)
devices have been deployed worldwide. Access control is essential in the IoT system, which …
devices have been deployed worldwide. Access control is essential in the IoT system, which …
Security threats and approaches in E-Health cloud architecture system with big data strategy using cryptographic algorithms
G Dhanalakshmi, VS George - Materials Today: Proceedings, 2022 - Elsevier
Cloud computing refers to the use of the Internet to deliver software to cloud consumers. For
storing and analyzing huge volumes of data from social media, enterprises, organizations …
storing and analyzing huge volumes of data from social media, enterprises, organizations …
[PDF][PDF] An Enhanced Data Integrity for the E-Health Cloud System using a Secure Hashing Cryptographic Algorithm with a Password Based Key Derivation Function2 …
G Dhanalakshmii, GV George - Int J Eng Trends Technol, 2022 - researchgate.net
Cloud computing has become an integral part of everyone's life since it allows us to share
our data with anyone at any time and from any location over the internet through a service …
our data with anyone at any time and from any location over the internet through a service …
[Retracted] Application of Information Encryption Technology in Computer Network Communication Security
H Zhang - Wireless Communications and Mobile Computing, 2022 - Wiley Online Library
In order to improve the communication efficiency while ensuring the security of
communication information, this paper proposes a design and research method of a …
communication information, this paper proposes a design and research method of a …
区块链在隐私计算中的应用研究进展.
刘炜, 唐琮轲, 马杰, 刘宇昭, 田钊… - Journal of Zhengzhou …, 2022 - search.ebscohost.com
大数据时代背景下, 数据安全面临严峻挑战, 隐私计算能够解决这一问题. 隐私计算是在保护数据
不外泄的前提下实现对数据计算分析的信息技术. 区块链拥有不可篡改, 可追溯等特性 …
不外泄的前提下实现对数据计算分析的信息技术. 区块链拥有不可篡改, 可追溯等特性 …
RansomClave: ransomware key management using SGX
A Bhudia, D O'Keeffe, D Sgandurra… - Proceedings of the 16th …, 2021 - dl.acm.org
Modern ransomware often generate and manage cryptographic keys on the victim's
machine, giving defenders an opportunity to capture exposed keys and recover encrypted …
machine, giving defenders an opportunity to capture exposed keys and recover encrypted …
[PDF][PDF] Secure and Privacy-Preserving storage of E-Healthcare data in the cloud: advanced data integrity measures and privacy assurance
G Dhanalakshmi, GVS George - International Journal of …, 2023 - researchgate.net
Cloud-based E-Healthcare systems require effective management of both internal and
external security risks, which can be addressed through a range of cloud security practices …
external security risks, which can be addressed through a range of cloud security practices …
Secure Authentication in Smart Home Environment Using SGX and Biometrics: Survey
Recently, our lifestyles have evolved to be smarter, with various devices becoming available
for daily activities, such as smartphones, smart watches, smart lighting, and smart cameras …
for daily activities, such as smartphones, smart watches, smart lighting, and smart cameras …