Security in fog computing: A systematic review on issues, challenges and solutions

R Rezapour, P Asghari, HHS Javadi… - Computer Science Review, 2021 - Elsevier
Fog computing refers to cloud computing development to the edge of a corporate network.
Fog computing, as a promising computing paradigm, facilitates computing, storing and …

Energy-efficient and secure mobile fog-based cloud for the Internet of Things

A Razaque, Y Jararweh, B Alotaibi, M Alotaibi… - Future Generation …, 2022 - Elsevier
The mobile fog-based cloud (MFBC) plays a major role for the Internet of Things (IoT) and is
highly suitable for obtaining virtualized data without additional waiting time. However, the …

Authenticated key agreement for IoT network using HECC and CRT four co-primes

C Goswami, A Adhikari, SK Sahoo, P Sarkar - Peer-to-Peer Networking …, 2024 - Springer
Abstract Internet of Things (IoT) is an integral part of our daily lives and the security of these
devices is paramount. However, IoT devices are often resource constrained, requiring …

A survey of key pre-distribution schemes based on combinatorial designs for resource-constrained devices in the IoT network

N Solari Esfehani, H Haj Seyyed Javadi - Wireless Networks, 2021 - Springer
Currently, IoT is being used as a novel tool in many applications. Some applications use the
end nodes such as wireless sensor network, RFID and embedded systems referred to as …

Scaling networks and capturing keys using combined combinatorial block designs

A Frolov, N Kochetova, A Klyagin - Computer Science On-line Conference, 2023 - Springer
This paper discusses a united approach to detecting blocks containing an uncompromised
key in wireless sensor networks that have a structure of combinatorial block designs and …

Replication‐aware secure resource administration scheme for Internet of Things‐smart city applications

E Al Solami - Transactions on Emerging Telecommunications …, 2021 - Wiley Online Library
The distributed and heterogeneous nature of the Internet of Things (IoT) paradigm provides
backhauled support for different smart‐city applications. As it provides ubiquitous access to …

CD-TMS: a combinatorial design-based token management system to enhance security and performance in blockchain

M Hadian, SH Erfani, M Deypir, M Mirabi - Cluster Computing, 2024 - Springer
Blockchain networks are consistently challenged with security and accessibility issues, and
technological developments call for the need for their security and integrity more than ever …

[PDF][PDF] A review on information security in cloud based system during covid-19 pandemic

P Chatterjee, S Mukherjee, R Bose… - Brainwave, Brainware …, 2021 - bwuexam.org
Work from Home is the new trend in corporate working culture in this Covid-19 pandemic
situation. Of course it is a preventative measure to avoid the infection from the disease. Not …

Scaling networks and capturing keys using combined systems of sets

A Frolov, N Kochetova - Society 5.0: Cyber-Solutions for Human-Centric …, 2023 - Springer
This chapter discusses a united approach to detecting blocks containing an uncompromised
key in wireless sensor networks with a structure of combinatorial designs and scaling those …

Enhancing Lattice-Based Attribute-Based Encryption with Robust Fine-Grained Access Policies.

S Khajouei-Nejad, S Jabbehdari… - ISeCure, 2025 - search.ebscohost.com
Protecting sensitive data is crucial in various fields, including Information Technologies,
Network Security, and healthcare records. Implementing precise access policies for …