A survey on cryptographic methods to secure communications for UAV traffic management

R Aissaoui, JC Deneuville, C Guerber… - Vehicular …, 2023 - Elsevier
Abstract Unmanned Aerial Systems (UAS) have a wide variety of applications, and their
development in terms of capabilities is continuously evolving. Many missions performed by …

[HTML][HTML] Efficient hybrid centralized and blockchain-based authentication architecture for heterogeneous IoT systems

OA Khashan, NM Khafajah - Journal of King Saud University-Computer and …, 2023 - Elsevier
With the rapid increase in the number of Internet of Things (IoT) devices in recent years,
massive amounts of sensitive IoT data are being generated and transmitted over the …

Malaria parasite detection using deep learning algorithms based on (CNNs) technique

MHD Alnussairi, AA İbrahim - Computers and Electrical Engineering, 2022 - Elsevier
Malaria is a life-threatening disease caused by female anopheles mosquito bites that are
prevalent in many regions of the world. We introduce a deep convolutional neural network …

A lightweight security model for ensuring patient privacy and confidentiality in telehealth applications

Z Wenhua, MK Hasan, NB Jailani, S Islam… - Computers in Human …, 2024 - Elsevier
Telehealth, a cornerstone of Healthcare 4.0 has widespread adoption owing to its
convenience and efficiency. However, the secure transmission of patient records over the …

Ensuring confidentiality of cyber-physical systems using event-based cryptography

PM Lima, LK Carvalho, MV Moreira - Information Sciences, 2023 - Elsevier
One of the most important challenges for the application of cyber-physical systems (CPS) in
smart industries is ensuring its security against cyber attacks. In this paper, we consider that …

Hybrid homomorphic‐asymmetric lightweight cryptosystem for securing smart devices: A review

R Mathews, DV Jose - Transactions on Emerging …, 2024 - Wiley Online Library
Abstract The Internet of Things (IoT) has emerged as a new concept in information and
communication technology, and its structure depends on smart device communications. It …

[書籍][B] Holy Quran

MH Shakir, MS Mahdi - 2023 - iasj.rdd.edu.iq
Because of the great development that took place in information transfer and communication
technologies, the issue of information transfer security has become a very sensitive and …

An efficient multilevel security architecture for blockchain-based IoT networks using principles of cellular automata

F Ali, S Mathew - PeerJ Computer Science, 2022 - peerj.com
The tremendous increase in the use of Internet of Things (IoT) has made an impact
worldwide by changing the mode of day-to-day life. Like any other application, IoT based …

UAV Traffic Management: A Survey On Communication Security

R Aissaoui, JC Deneuville, C Guerber… - arxiv preprint arxiv …, 2022 - arxiv.org
Unmanned Aerial Systems (UAS) have a wide variety of applications, and their development
in terms of capabilities is continuously evolving. Many missions performed by an Unmanned …

Novel image pixel scrambling technique for efficient color image encryption in resource-constrained IoT devices

C İnce, K İnce, D Hanbay - Multimedia Tools and Applications, 2024 - Springer
In the digital age, where data is a valuable commodity, securing sensitive information has
become a growing concern. Image encryption techniques play an essential role in protecting …