A survey on cryptographic methods to secure communications for UAV traffic management
R Aissaoui, JC Deneuville, C Guerber… - Vehicular …, 2023 - Elsevier
Abstract Unmanned Aerial Systems (UAS) have a wide variety of applications, and their
development in terms of capabilities is continuously evolving. Many missions performed by …
development in terms of capabilities is continuously evolving. Many missions performed by …
[HTML][HTML] Efficient hybrid centralized and blockchain-based authentication architecture for heterogeneous IoT systems
With the rapid increase in the number of Internet of Things (IoT) devices in recent years,
massive amounts of sensitive IoT data are being generated and transmitted over the …
massive amounts of sensitive IoT data are being generated and transmitted over the …
Malaria parasite detection using deep learning algorithms based on (CNNs) technique
Malaria is a life-threatening disease caused by female anopheles mosquito bites that are
prevalent in many regions of the world. We introduce a deep convolutional neural network …
prevalent in many regions of the world. We introduce a deep convolutional neural network …
A lightweight security model for ensuring patient privacy and confidentiality in telehealth applications
Telehealth, a cornerstone of Healthcare 4.0 has widespread adoption owing to its
convenience and efficiency. However, the secure transmission of patient records over the …
convenience and efficiency. However, the secure transmission of patient records over the …
Ensuring confidentiality of cyber-physical systems using event-based cryptography
One of the most important challenges for the application of cyber-physical systems (CPS) in
smart industries is ensuring its security against cyber attacks. In this paper, we consider that …
smart industries is ensuring its security against cyber attacks. In this paper, we consider that …
Hybrid homomorphic‐asymmetric lightweight cryptosystem for securing smart devices: A review
R Mathews, DV Jose - Transactions on Emerging …, 2024 - Wiley Online Library
Abstract The Internet of Things (IoT) has emerged as a new concept in information and
communication technology, and its structure depends on smart device communications. It …
communication technology, and its structure depends on smart device communications. It …
An efficient multilevel security architecture for blockchain-based IoT networks using principles of cellular automata
F Ali, S Mathew - PeerJ Computer Science, 2022 - peerj.com
The tremendous increase in the use of Internet of Things (IoT) has made an impact
worldwide by changing the mode of day-to-day life. Like any other application, IoT based …
worldwide by changing the mode of day-to-day life. Like any other application, IoT based …
UAV Traffic Management: A Survey On Communication Security
R Aissaoui, JC Deneuville, C Guerber… - arxiv preprint arxiv …, 2022 - arxiv.org
Unmanned Aerial Systems (UAS) have a wide variety of applications, and their development
in terms of capabilities is continuously evolving. Many missions performed by an Unmanned …
in terms of capabilities is continuously evolving. Many missions performed by an Unmanned …
Novel image pixel scrambling technique for efficient color image encryption in resource-constrained IoT devices
In the digital age, where data is a valuable commodity, securing sensitive information has
become a growing concern. Image encryption techniques play an essential role in protecting …
become a growing concern. Image encryption techniques play an essential role in protecting …