Providing end-to-end security using quantum walks in IoT networks

AA Abd El-Latif, B Abd-El-Atty… - IEEE …, 2020 - ieeexplore.ieee.org
Internet of Things acts an essential role in our everyday lives and it definitely has the
potential to grow on the importance and revolutionize our future. However, the present …

Blockchain-based data storage with privacy and authentication in internet of things

R Goyat, G Kumar, M Alazab, M Conti… - IEEE Internet of …, 2020 - ieeexplore.ieee.org
Internet of Things (IoT) composed of large number of sensing devices with a variety of
features applicable for various applications. In such scenarios, due to low data handling …

Achieving graph clustering privacy preservation based on structure entropy in social IoT

Y Tian, Z Zhang, J **ong, L Chen… - IEEE Internet of Things …, 2021 - ieeexplore.ieee.org
Decoding the real structure from the Social Internet-of-Things (SIoT) network with a large-
scale noise structure plays a fundamental role in data mining. Protecting private information …

Provable data deletion from efficient data integrity auditing and insertion in cloud storage

C Yang, Y Liu, F Zhao, S Zhang - Computer Standards & Interfaces, 2022 - Elsevier
With the widespread popularity of cloud storage, a growing number of data owners are
willing to outsource their massive data to remote cloud servers, thus effectively avoiding the …

A lightweight and secure anonymity preserving protocol for WBAN

AM Almuhaideb, KS Alqudaihi - IEEE Access, 2020 - ieeexplore.ieee.org
In the medical fields, wearable body area sensors network (WBAN) is playing a major role in
maintaining user health by providing convenience service for the patient and doctors …

DouBiGRU-A: software defect detection algorithm based on attention mechanism and double BiGRU

J Zhao, S Guo, D Mu - Computers & Security, 2021 - Elsevier
Software defects such as errors, bugs, and failures lead to poor usability and low efficiency,
severely degrading the user experience. Bugs in the code are among the key areas of …

CamoDroid: An Android application analysis environment resilient against sandbox evasion

F Faghihi, M Zulkernine, S Ding - Journal of Systems Architecture, 2022 - Elsevier
In the past few years, numerous attempts have been made to mitigate evasive Android
malware. However, it remains one of the challenges in smartphone security. Evasive …

CP‐ABE‐Based Secure and Verifiable Data Deletion in Cloud

J Ma, M Wang, J **ong, Y Hu - Security and Communication …, 2021 - Wiley Online Library
Cloud data, the ownership of which is separated from their administration, usually contain
users' private information, especially in the fifth‐generation mobile communication (5G) …

A Privacy‐Preserving Personalized Service Framework through Bayesian Game in Social IoT

R Bi, Q Chen, L Chen, J **ong… - … and Mobile Computing, 2020 - Wiley Online Library
It is enormously challenging to achieve a satisfactory balance between quality of service
(QoS) and users' privacy protection along with measuring privacy disclosure in social …

Security of IoT device: perspective forensic/anti-forensic issues on invalid area of NAND flash memory

NY Ahn, DH Lee - IEEE Access, 2022 - ieeexplore.ieee.org
NAND flash memory-based IoT device can potentially still leave behind original personal
data in an invalid area even if the data has been deleted. In this paper, we raise the forensic …