Learning-based methods for cyber attacks detection in IoT systems: A survey on methods, analysis, and future prospects
Internet of Things (IoT) is a develo** technology that provides the simplicity and benefits of
exchanging data with other devices using the cloud or wireless networks. However, the …
exchanging data with other devices using the cloud or wireless networks. However, the …
Suitability analysis of consensus protocols for blockchain-based applications in the construction industry
Blockchain technology has gained increasing attention in the construction sector. The
process of develo** a blockchain-based application that fits user requirements largely …
process of develo** a blockchain-based application that fits user requirements largely …
Efficient revocable attribute-based encryption with verifiable data integrity
S Chen, J Li, Y Zhang, J Han - IEEE Internet of Things Journal, 2023 - ieeexplore.ieee.org
Nowadays, cloud computing and cloud storage services that can reduce the local workload
are becoming increasingly popular, allowing individual and corporate users to upload data …
are becoming increasingly popular, allowing individual and corporate users to upload data …
Identity-based broadcast proxy re-encryption for flexible data sharing in VANETs
Data sharing is an integral part of vehicular ad hoc networks (VANETs), which provide
drivers with safe and comfortable driving environments. However, when data are shared …
drivers with safe and comfortable driving environments. However, when data are shared …
Ciphertext-policy attribute-based encryption supporting policy-hiding and cloud auditing in smart health
H Wang, J Liang, Y Ding, S Tang, Y Wang - Computer Standards & …, 2023 - Elsevier
Smart Health, with its flexibility and efficiency, has been widely deployed, especially during
the COVID-19 pandemic. However, privacy protection mechanisms for Smart Health are not …
the COVID-19 pandemic. However, privacy protection mechanisms for Smart Health are not …
Toward secure distributed data storage with error locating in blockchain enabled edge computing
The technique of Internet of things (IoT) connects the distributed devices via the network that
can realize smart applications, such as intelligent transportation, intelligent manufacturing …
can realize smart applications, such as intelligent transportation, intelligent manufacturing …
Nano: Cryptographic enforcement of readability and editability governance in blockchain databases
Recently, increasing personal data has been stored in blockchain databases, ensuring data
integrity by consensus. Although transparent and immutable blockchains are mainly …
integrity by consensus. Although transparent and immutable blockchains are mainly …
Verifiable, fair and privacy-preserving broadcast authorization for flexible data sharing in clouds
The cloud-based data sharing technology with cryptographic primitives enables data owners
to outsource data into paradigms and privately share information with arbitrary recipients …
to outsource data into paradigms and privately share information with arbitrary recipients …
Machine learning approach using artificial neural networks to detect malicious nodes in IoT networks
KKS Liyakat - International Conference on Machine Learning, IoT …, 2023 - Springer
Devices can now effortlessly and wirelessly share data with one another over the internet or
other networked systems thanks to a relatively new technology called Internet of Things …
other networked systems thanks to a relatively new technology called Internet of Things …
DOA tracking for seamless connectivity in beamformed IoT-based drones
In recent times, there has been a surge of interest around the usage of adaptive antenna
arrays of Internet of Things (IoT) based Drones in the communication systems. Adaptive …
arrays of Internet of Things (IoT) based Drones in the communication systems. Adaptive …