The metaverse digital environments: a sco** review of the challenges, privacy and security issues
The concept of the “metaverse” has garnered significant attention recently, positioned as the
“next frontier” of the internet. This emerging digital realm carries substantial economic and …
“next frontier” of the internet. This emerging digital realm carries substantial economic and …
Clfldp: communication-efficient layer clip** federated learning with local differential privacy
Privacy preserving is a severe challenge in machine learning and artificial intelligence.
Recently, many works have been devoted to solving this problem by proposing various …
Recently, many works have been devoted to solving this problem by proposing various …
Flexibly expressive and revocable multi-authority KP-ABE scheme from RLWE for Internet of Medical Things
S **e, L Zhang, Q Wu, F Rezaeibagha - Journal of Systems Architecture, 2024 - Elsevier
The emergence of the Internet of Medical Things (IoMT) has presented numerous
opportunities for the healthcare industry. It is anticipated to enhance the quality and …
opportunities for the healthcare industry. It is anticipated to enhance the quality and …
PQCAIE: Post quantum cryptographic authentication scheme for IoT-based e-health systems
The increasing integration of Internet of Things (IoT) technologies in consumer electronics
has revolutionized various sectors, including healthcare. This evolution has led to the …
has revolutionized various sectors, including healthcare. This evolution has led to the …
Enhanced privacy-preserving distributed deep learning with application to fog-based IoT
Generally, privacy-preserving distributed deep learning (PPDDL) solutions provided so far
present a trade-off between privacy and efficiency/effectiveness, especially, in terms of high …
present a trade-off between privacy and efficiency/effectiveness, especially, in terms of high …
An enhanced traceable access control scheme based on multi-authority CP-ABE for cloud-assisted e-health system
X Liu, Z Wei, G Li, J Chen - Computer Networks, 2024 - Elsevier
Due to the inherent openness of the Internet of Things (IoT), e-health systems that utilize this
technology on a broad scale are susceptible to network attacks. The propose black and …
technology on a broad scale are susceptible to network attacks. The propose black and …
An efficient conference key agreement protocol suited for resource constrained devices
M Pundir, A Kumar - Journal of Parallel and Distributed Computing, 2025 - Elsevier
Conference key agreement (CKA) is essential for securing communication in group-oriented
scenarios like multi-party messaging and collaborative environments. While elliptic curve …
scenarios like multi-party messaging and collaborative environments. While elliptic curve …
[HTML][HTML] Cellular automata-based MapReduce design: Migrating a big data processing model from Industry 4.0 to Industry 5.0
A Mitra - e-Prime-Advances in Electrical Engineering …, 2024 - Elsevier
A successful deployment of Industry 5.0 is significantly dependent on the synergetic
integration of several advanced technologies such as big data processing, Artificial …
integration of several advanced technologies such as big data processing, Artificial …
Asynchronous verifiable information dispersal protocol of achieving optimal communication
Z Pang, L Shi, H **ang - Computer Networks, 2024 - Elsevier
The evolution of distributed systems necessitates robust protocols to facilitate secure and
efficient data storage and retrieval amid challenges like asynchronous communication and …
efficient data storage and retrieval amid challenges like asynchronous communication and …
LPHD: A low power and high diffusion lightweight block cipher
R Xu, L Li, X Huang - International Journal of Circuit Theory …, 2024 - Wiley Online Library
Smart door locks pose a large number of threats such as network attacks. Its storage area
and power of cipher are severely limited because the wireless nodes of smart door locks are …
and power of cipher are severely limited because the wireless nodes of smart door locks are …