The metaverse digital environments: a sco** review of the challenges, privacy and security issues

M Tukur, J Schneider, M Househ, AH Dokoro… - Frontiers in big …, 2023 - frontiersin.org
The concept of the “metaverse” has garnered significant attention recently, positioned as the
“next frontier” of the internet. This emerging digital realm carries substantial economic and …

Clfldp: communication-efficient layer clip** federated learning with local differential privacy

S Chen, J Yang, G Wang, Z Wang, H Yin… - Journal of Systems …, 2024 - Elsevier
Privacy preserving is a severe challenge in machine learning and artificial intelligence.
Recently, many works have been devoted to solving this problem by proposing various …

Flexibly expressive and revocable multi-authority KP-ABE scheme from RLWE for Internet of Medical Things

S **e, L Zhang, Q Wu, F Rezaeibagha - Journal of Systems Architecture, 2024 - Elsevier
The emergence of the Internet of Medical Things (IoMT) has presented numerous
opportunities for the healthcare industry. It is anticipated to enhance the quality and …

PQCAIE: Post quantum cryptographic authentication scheme for IoT-based e-health systems

K Mansoor, M Afzal, W Iqbal, Y Abbas, S Mussiraliyeva… - Internet of Things, 2024 - Elsevier
The increasing integration of Internet of Things (IoT) technologies in consumer electronics
has revolutionized various sectors, including healthcare. This evolution has led to the …

Enhanced privacy-preserving distributed deep learning with application to fog-based IoT

E Antwi-Boasiako, S Zhou, Y Liao, E Kuada, EK Danso - Internet of Things, 2024 - Elsevier
Generally, privacy-preserving distributed deep learning (PPDDL) solutions provided so far
present a trade-off between privacy and efficiency/effectiveness, especially, in terms of high …

An enhanced traceable access control scheme based on multi-authority CP-ABE for cloud-assisted e-health system

X Liu, Z Wei, G Li, J Chen - Computer Networks, 2024 - Elsevier
Due to the inherent openness of the Internet of Things (IoT), e-health systems that utilize this
technology on a broad scale are susceptible to network attacks. The propose black and …

An efficient conference key agreement protocol suited for resource constrained devices

M Pundir, A Kumar - Journal of Parallel and Distributed Computing, 2025 - Elsevier
Conference key agreement (CKA) is essential for securing communication in group-oriented
scenarios like multi-party messaging and collaborative environments. While elliptic curve …

[HTML][HTML] Cellular automata-based MapReduce design: Migrating a big data processing model from Industry 4.0 to Industry 5.0

A Mitra - e-Prime-Advances in Electrical Engineering …, 2024 - Elsevier
A successful deployment of Industry 5.0 is significantly dependent on the synergetic
integration of several advanced technologies such as big data processing, Artificial …

Asynchronous verifiable information dispersal protocol of achieving optimal communication

Z Pang, L Shi, H **ang - Computer Networks, 2024 - Elsevier
The evolution of distributed systems necessitates robust protocols to facilitate secure and
efficient data storage and retrieval amid challenges like asynchronous communication and …

LPHD: A low power and high diffusion lightweight block cipher

R Xu, L Li, X Huang - International Journal of Circuit Theory …, 2024 - Wiley Online Library
Smart door locks pose a large number of threats such as network attacks. Its storage area
and power of cipher are severely limited because the wireless nodes of smart door locks are …