[Retracted] The Rise of Cloud Computing: Data Protection, Privacy, and Open Research Challenges—A Systematic Literature Review (SLR)
J Hassan, D Shehzad, U Habib… - Computational …, 2022 - Wiley Online Library
Cloud computing is a long‐standing dream of computing as a utility, where users can store
their data remotely in the cloud to enjoy on‐demand services and high‐quality applications …
their data remotely in the cloud to enjoy on‐demand services and high‐quality applications …
Detecting node replication attacks in wireless sensor networks: a survey
A wireless sensor network (WSN) consists of a number of tiny, low-cost, and resource-
constrained sensor nodes, but is often deployed in unattended and harsh environments to …
constrained sensor nodes, but is often deployed in unattended and harsh environments to …
ACPN: A novel authentication framework with conditional privacy-preservation and non-repudiation for VANETs
In Vehicular Ad hoc NETworks (VANETs), authentication is a crucial security service for both
inter-vehicle and vehicle-roadside communications. On the other hand, vehicles have to be …
inter-vehicle and vehicle-roadside communications. On the other hand, vehicles have to be …
Secure and efficient data transmission for cluster-based wireless sensor networks
Secure data transmission is a critical issue for wireless sensor networks (WSNs). Clustering
is an effective and practical way to enhance the system performance of WSNs. In this paper …
is an effective and practical way to enhance the system performance of WSNs. In this paper …
Secure and efficient data communication protocol for wireless body area networks
Wireless Body Area Networks (WBANs) are expected to play a major role in the field of
patient-health monitoring in the near future, which gains tremendous attention amongst …
patient-health monitoring in the near future, which gains tremendous attention amongst …
CPPA-D: Efficient conditional privacy-preserving authentication scheme with double-insurance in VANETs
W **ong, R Wang, Y Wang, F Zhou… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
With the establishment of the intelligent transportation system (ITS), the vehicular ad hoc
networks (VANETs) play a significant role for improving traffic safety and efficiency. In order …
networks (VANETs) play a significant role for improving traffic safety and efficiency. In order …
Crypto hash algorithm-based blockchain technology for managing decentralized ledger database in oil and gas industry
This research work proposes a method for the securing and monitoring of petroleum product
distribution records in a decentralized ledger database using blockchain technology. The …
distribution records in a decentralized ledger database using blockchain technology. The …
Body area network security: a fuzzy attribute-based signcryption scheme
Body Area Networks (BANs) are expected to play a major role in the field of patient-health
monitoring in the near future. While it is vital to support secure BAN access to address the …
monitoring in the near future. While it is vital to support secure BAN access to address the …
Privacy-preserving public auditing protocol for low-performance end devices in cloud
Cloud storage provides tremendous storage resources for both individual and enterprise
users. In a cloud storage system, the data owned by a user are no longer possessed locally …
users. In a cloud storage system, the data owned by a user are no longer possessed locally …
Efficient and privacy-preserving authentication protocol for heterogeneous systems in IIoT
The Industrial Internet of Things (IIoT) is expected to provide a promising opportunity to
revolutionize the production operation of the existing industrial systems by leveraging smart …
revolutionize the production operation of the existing industrial systems by leveraging smart …