Emerging technologies for 5G-enabled vehicular networks

Y Yang, K Hua - IEEE access, 2019 - ieeexplore.ieee.org
Internet of Vehicles is a specific application of Internet of Things technology in intelligent
transportation systems, and has attracted attention of relevant research institutions …

BSeIn: A blockchain-based secure mutual authentication with fine-grained access control system for industry 4.0

C Lin, D He, X Huang, KKR Choo… - Journal of network and …, 2018 - Elsevier
To be prepared for the 'Industry 4.0'-era, we propose a hierarchical framework comprising
four tangible layers, which is designed to vertically integrate inter-organizational value …

Security, privacy & efficiency of sustainable cloud computing for big data & IoT

C Stergiou, KE Psannis, BB Gupta… - … Computing: Informatics and …, 2018 - Elsevier
With the significant advances in communication technologies and in many other sectors,
also are growing up security and privacy issues. In our research, is introduced a base …

Security in Internet of Things: issues, challenges, taxonomy, and architecture

V Adat, BB Gupta - Telecommunication Systems, 2018 - Springer
Internet technology is very pervasive today. The number of devices connected to the
Internet, those with a digital identity, is increasing day by day. With the developments in the …

Security and privacy implications on database systems in big data era: A survey

GD Samaraweera, JM Chang - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
For over many decades, relational database model has been considered as the leading
model for data storage and management. However, as the Big Data explosion has …

Secured data collection with hardware-based ciphers for IoT-based healthcare

H Tao, MZA Bhuiyan, AN Abdalla… - IEEE Internet of …, 2018 - ieeexplore.ieee.org
There are tremendous security concerns with patient health monitoring sensors in Internet of
Things (IoT). The concerns are also realized by recent sophisticated security and privacy …

Workflow scheduling using hybrid GA‐PSO algorithm in cloud computing

AM Manasrah, H Ba Ali - Wireless Communications and Mobile …, 2018 - Wiley Online Library
Cloud computing environment provides several on‐demand services and resource sharing
for clients. Business processes are managed using the workflow technology over the cloud …

Differentially private Naive Bayes learning over multiple data sources

T Li, J Li, Z Liu, P Li, C Jia - Information Sciences, 2018 - Elsevier
For meeting diverse requirements of data analysis, the machine learning classifier has been
provided as a tool to evaluate data in many applications. Due to privacy concerns of …

Secure timestamp-based mutual authentication protocol for IoT devices using RFID tags

A Tewari, BB Gupta - International Journal on Semantic Web and …, 2020 - igi-global.com
Abstract Internet of Things (IoT) is playing more and more important roles in our daily lives in
the last decade. It can be a part of traditional machine or equipment to daily household …

An ID-based linearly homomorphic signature scheme and its application in blockchain

Q Lin, H Yan, Z Huang, W Chen, J Shen, Y Tang - IEEE Access, 2018 - ieeexplore.ieee.org
Identity-based cryptosystems mean that public keys can be directly derived from user
identifiers, such as telephone numbers, email addresses, and social insurance number, and …