[HTML][HTML] A review of functional encryption in IoT applications

K Shahzad, T Zia, EH Qazi - Sensors, 2022 - mdpi.com
The Internet of Things (IoT) represents a growing aspect of how entities, including humans
and organizations, are likely to connect with others in their public and private interactions …

Fuzzy identity-based data integrity auditing for reliable cloud storage systems

Y Li, Y Yu, G Min, W Susilo, J Ni… - IEEE Transactions on …, 2017 - ieeexplore.ieee.org
Data integrity, a core security issue in reliable cloud storage, has received much attention.
Data auditing protocols enable a verifier to efficiently check the integrity of the outsourced …

Sprite: A simple, cheat-proof, credit-based system for mobile ad-hoc networks

S Zhong, J Chen, YR Yang - IEEE INFOCOM 2003. Twenty …, 2003 - ieeexplore.ieee.org
Mobile ad hoc networking has been an active research area for several years. How to
stimulate cooperation among selfish mobile nodes, however, is not well addressed yet. In …

Privacy preserving biometric authentication on the blockchain for smart healthcare

ND Sarier - Pervasive and Mobile Computing, 2022 - Elsevier
Abstract Privacy Preserving Biometric Authentication (PPBA) schemes are designed for
anonymous authentication of patients to protect patient's privacy in accessing healthcare …

A novel approach to fingerprint biometric-based cryptographic key generation and its applications to storage security

G Panchal, D Samanta - Computers & Electrical Engineering, 2018 - Elsevier
Existing biometric-based security mechanisms to ensure storage security follow Biometric
Enrolment, Key Binding, Secure Sketch, Fuzzy vault or template store along with key of a …

A survey on secure communication techniques for 5G wireless heterogeneous networks

A Kakkar - Information Fusion, 2020 - Elsevier
With the increasing number of emerging robust networks, the challenges to design new
security protocols and techniques are never ending. With the enlargement of 5G paradigm …

An In-Depth Examination of Artificial Intelligence-Enhanced Cybersecurity in Robotics, Autonomous Systems, and Critical Infrastructures

F Santoso, A Finn - IEEE Transactions on Services Computing, 2023 - ieeexplore.ieee.org
Recent developments in cutting-edge robotics constantly face increased cyber threats, not
only in terms of quantity and frequency of attacks, but also when it comes to quality and …

Synthesizing privacy preserving traces: Enhancing plausibility with social networks

P Zhao, H Jiang, J Li, F Zeng, X Zhu… - … /ACM Transactions on …, 2019 - ieeexplore.ieee.org
Due to the popularity of mobile computing and mobile sensing, users' traces can now be
readily collected to enhance applications' performance. However, users' location privacy …

Secure fuzzy identity-based public verification for cloud storage

Y Xu, C **, W Qin, J Shan, Y ** - Journal of Systems Architecture, 2022 - Elsevier
The rapid development of cloud storage services brings many security challenges. Data
integrity, as the top priority of these security challenges, has always been a research …

Gait-based privacy protection for smart wearable devices

Y Su, Y Li, Z Cao - IEEE Internet of Things Journal, 2023 - ieeexplore.ieee.org
Smart wearable devices (SWDs) collect and store sensitive daily information of many
people. Its primary method of identification is still the password unlocking method. However …