A systematic review on the status and progress of homomorphic encryption technologies
With the emergence of big data and the continued growth in cloud computing applications,
serious security and privacy concerns emerged. Consequently, several researchers and …
serious security and privacy concerns emerged. Consequently, several researchers and …
A survey on zero-knowledge authentication for internet of things
Z Chen, Y Jiang, X Song, L Chen - Electronics, 2023 - mdpi.com
The Internet of Things (IoT) is ubiquitous in our lives. However, the inherent vulnerability of
IoT smart devices can lead to the destruction of networks in untrustworthy environments …
IoT smart devices can lead to the destruction of networks in untrustworthy environments …
Secure health monitoring communication systems based on IoT and cloud computing for medical emergency applications
Smart health surveillance technology has attracted wide attention between patients and
professionals or specialists to provide early detection of critical abnormal situations without …
professionals or specialists to provide early detection of critical abnormal situations without …
Privacyprotector: Privacy-protected patient data collection in IoT-based healthcare systems
In IoT-based healthcare, medical devices are more vulnerable to numerous security threats
and attacks than other network devices. Current solutions are able to provide protection to …
and attacks than other network devices. Current solutions are able to provide protection to …
Secured data collection with hardware-based ciphers for IoT-based healthcare
There are tremendous security concerns with patient health monitoring sensors in Internet of
Things (IoT). The concerns are also realized by recent sophisticated security and privacy …
Things (IoT). The concerns are also realized by recent sophisticated security and privacy …
Internet of things: from internet scale sensing to smart services
The internet of things (IoT) is the latest web evolution that incorporates billions of devices
(such as cameras, sensors, RFIDs, smart phones, and wearables), that are owned by …
(such as cameras, sensors, RFIDs, smart phones, and wearables), that are owned by …
Providing task allocation and secure deduplication for mobile crowdsensing via fog computing
Mobile crowdsensing enables a crowd of individuals to cooperatively collect data for special
interest customers using their mobile devices. The success of mobile crowdsensing largely …
interest customers using their mobile devices. The success of mobile crowdsensing largely …
Privacy preserving Internet of Things: From privacy techniques to a blueprint architecture and efficient implementation
Abstract The Internet of Things (IoT) is the latest web evolution that incorporates billions of
devices that are owned by different organisations and people who are deploying and using …
devices that are owned by different organisations and people who are deploying and using …
Improved Security of E-Healthcare Images Using Hybridized Robust Zero-Watermarking and Hyper-Chaotic System along with RSA
With the rapid advancements of the internet of things (IoT), several applications have
evolved with completely dissimilar structures and requirements. However, the fifth …
evolved with completely dissimilar structures and requirements. However, the fifth …
Securing E‐Healthcare Images Using an Efficient Image Encryption Model
With the advancements in e‐healthcare services, it is possible to provide remote medical
services to patients and swifter first aid. Medical images play an essential role in e …
services to patients and swifter first aid. Medical images play an essential role in e …