A systematic review on the status and progress of homomorphic encryption technologies

M Alloghani, MM Alani, D Al-Jumeily, T Baker… - Journal of Information …, 2019 - Elsevier
With the emergence of big data and the continued growth in cloud computing applications,
serious security and privacy concerns emerged. Consequently, several researchers and …

A survey on zero-knowledge authentication for internet of things

Z Chen, Y Jiang, X Song, L Chen - Electronics, 2023 - mdpi.com
The Internet of Things (IoT) is ubiquitous in our lives. However, the inherent vulnerability of
IoT smart devices can lead to the destruction of networks in untrustworthy environments …

Secure health monitoring communication systems based on IoT and cloud computing for medical emergency applications

AI Siam, MA Almaiah, A Al-Zahrani… - Computational …, 2021 - Wiley Online Library
Smart health surveillance technology has attracted wide attention between patients and
professionals or specialists to provide early detection of critical abnormal situations without …

Privacyprotector: Privacy-protected patient data collection in IoT-based healthcare systems

E Luo, MZA Bhuiyan, G Wang… - IEEE …, 2018 - ieeexplore.ieee.org
In IoT-based healthcare, medical devices are more vulnerable to numerous security threats
and attacks than other network devices. Current solutions are able to provide protection to …

Secured data collection with hardware-based ciphers for IoT-based healthcare

H Tao, MZA Bhuiyan, AN Abdalla… - IEEE Internet of …, 2018 - ieeexplore.ieee.org
There are tremendous security concerns with patient health monitoring sensors in Internet of
Things (IoT). The concerns are also realized by recent sophisticated security and privacy …

Internet of things: from internet scale sensing to smart services

D Georgakopoulos, PP Jayaraman - Computing, 2016 - Springer
The internet of things (IoT) is the latest web evolution that incorporates billions of devices
(such as cameras, sensors, RFIDs, smart phones, and wearables), that are owned by …

Providing task allocation and secure deduplication for mobile crowdsensing via fog computing

J Ni, K Zhang, Y Yu, X Lin… - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
Mobile crowdsensing enables a crowd of individuals to cooperatively collect data for special
interest customers using their mobile devices. The success of mobile crowdsensing largely …

Privacy preserving Internet of Things: From privacy techniques to a blueprint architecture and efficient implementation

PP Jayaraman, X Yang, A Yavari… - Future Generation …, 2017 - Elsevier
Abstract The Internet of Things (IoT) is the latest web evolution that incorporates billions of
devices that are owned by different organisations and people who are deploying and using …

Improved Security of E-Healthcare Images Using Hybridized Robust Zero-Watermarking and Hyper-Chaotic System along with RSA

J Jain, A Jain, SK Srivastava, C Verma, MS Raboaca… - Mathematics, 2022 - mdpi.com
With the rapid advancements of the internet of things (IoT), several applications have
evolved with completely dissimilar structures and requirements. However, the fifth …

Securing E‐Healthcare Images Using an Efficient Image Encryption Model

J Jain, A Jain - Scientific Programming, 2022 - Wiley Online Library
With the advancements in e‐healthcare services, it is possible to provide remote medical
services to patients and swifter first aid. Medical images play an essential role in e …