The abnormal traffic detection scheme based on PCA and SSH

Z Wang, D Han, M Li, H Liu, M Cui - Connection Science, 2022 - Taylor & Francis
Network abnormal traffic detection can monitor the network environment in real time by
extracting and analysing network traffic characteristics, and plays an important role in …

Privacy preserving using enhanced shadow honeypot technique for data retrieval in cloud computing

T Saravanan, S Saravanakumar - 2021 3rd International …, 2021 - ieeexplore.ieee.org
Data has been essential to all facets of human life in the last decades. In recent years, the
enormous growth of data has an outcome of the development of various applications. This …

A literature review on V2X communications security: Foundation, solutions, status, and future

Z Ying, K Wang, J **ong, M Ma - IET Communications, 2024 - Wiley Online Library
With the refinement and development of the Vehicle to Everything (V2X) concept, its security
issues have gradually come to the fore, revealing many security risks and increasing …

A privacy-preserving and efficient data sharing scheme with trust authentication based on blockchain for mHealth

S Xu, J Zhong, L Wang, D He, S Zhang… - Connection …, 2023 - Taylor & Francis
The mobile healthcare (mHealth) is a promising and fascinating paradigm, which can
dramatically improve the quality of healthcare delivery by providing remote diagnosis and …

Constrained-based power management algorithm for green cloud computing

SK Nayak, SK Panda, S Das - International Journal of …, 2022 - inderscienceonline.com
In green cloud computing (GCC), power management provides many advantages, such as
reducing costs, saving the environment and improving system efficiency. It is adopted in …

Securing the Information using Improved Modular Encryption Standard in Cloud Computing Environment

AS Ismail, D Pradeep, J Ashok - KSII Transactions on Internet and …, 2023 - koreascience.kr
All aspects of human life have become increasingly dependent on data in the last few
decades. The development of several applications causes an enormous issue on data …

A multi-dimension traceable privacy-preserving prevention and control scheme of the COVID-19 epidemic based on blockchain

S Yao, P **g, P Li, J Chen - Connection Science, 2022 - Taylor & Francis
The outbreak of COVID-19 has brought great pain to people around the world. As an
epidemic prevention and control measure, the health QR code (HC) has been designed to …

Towards achieving efficient access control of medical data with both forward and backward secrecy

S Panda, S Mondal, R Dewri, AK Das - Computer Communications, 2022 - Elsevier
Healthcare service providers store the patients' electronic medical records in the cloud in
order to provide high quality healthcare services. Patients' sensitive data is typically …

Multi-keywords fuzzy search encryption supporting dynamic update in an intelligent edge network

X Yan, P Yin, Y Tang, S Feng - Connection Science, 2022 - Taylor & Francis
In an intelligent edge network, data owners encrypt data and outsource it to the edge servers
to prevent the leakage of data and user information. It is a research issue to achieve efficient …

A novel method for generating public keys involving matrix operations

X Sun, J Han, B Lv, C Sun, C Zeng - PloS one, 2024 - journals.plos.org
With the rise of the Internet of things, the limitations of traditional PKI certificate
authentication technology have progressively emerged. Hence, identity-based public key …