Emerging technologies for 5G-enabled vehicular networks
Y Yang, K Hua - IEEE access, 2019 - ieeexplore.ieee.org
Internet of Vehicles is a specific application of Internet of Things technology in intelligent
transportation systems, and has attracted attention of relevant research institutions …
transportation systems, and has attracted attention of relevant research institutions …
BSeIn: A blockchain-based secure mutual authentication with fine-grained access control system for industry 4.0
To be prepared for the 'Industry 4.0'-era, we propose a hierarchical framework comprising
four tangible layers, which is designed to vertically integrate inter-organizational value …
four tangible layers, which is designed to vertically integrate inter-organizational value …
Security, privacy & efficiency of sustainable cloud computing for big data & IoT
With the significant advances in communication technologies and in many other sectors,
also are growing up security and privacy issues. In our research, is introduced a base …
also are growing up security and privacy issues. In our research, is introduced a base …
Security in Internet of Things: issues, challenges, taxonomy, and architecture
V Adat, BB Gupta - Telecommunication Systems, 2018 - Springer
Internet technology is very pervasive today. The number of devices connected to the
Internet, those with a digital identity, is increasing day by day. With the developments in the …
Internet, those with a digital identity, is increasing day by day. With the developments in the …
Security and privacy implications on database systems in big data era: A survey
GD Samaraweera, JM Chang - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
For over many decades, relational database model has been considered as the leading
model for data storage and management. However, as the Big Data explosion has …
model for data storage and management. However, as the Big Data explosion has …
Secured data collection with hardware-based ciphers for IoT-based healthcare
There are tremendous security concerns with patient health monitoring sensors in Internet of
Things (IoT). The concerns are also realized by recent sophisticated security and privacy …
Things (IoT). The concerns are also realized by recent sophisticated security and privacy …
Workflow scheduling using hybrid GA‐PSO algorithm in cloud computing
AM Manasrah, H Ba Ali - Wireless Communications and Mobile …, 2018 - Wiley Online Library
Cloud computing environment provides several on‐demand services and resource sharing
for clients. Business processes are managed using the workflow technology over the cloud …
for clients. Business processes are managed using the workflow technology over the cloud …
Differentially private Naive Bayes learning over multiple data sources
For meeting diverse requirements of data analysis, the machine learning classifier has been
provided as a tool to evaluate data in many applications. Due to privacy concerns of …
provided as a tool to evaluate data in many applications. Due to privacy concerns of …
Secure timestamp-based mutual authentication protocol for IoT devices using RFID tags
A Tewari, BB Gupta - International Journal on Semantic Web and …, 2020 - igi-global.com
Abstract Internet of Things (IoT) is playing more and more important roles in our daily lives in
the last decade. It can be a part of traditional machine or equipment to daily household …
the last decade. It can be a part of traditional machine or equipment to daily household …
An ID-based linearly homomorphic signature scheme and its application in blockchain
Identity-based cryptosystems mean that public keys can be directly derived from user
identifiers, such as telephone numbers, email addresses, and social insurance number, and …
identifiers, such as telephone numbers, email addresses, and social insurance number, and …