A survey on security and privacy of 5G technologies: Potential solutions, recent advancements, and future directions
Security has become the primary concern in many telecommunications industries today as
risks can have high consequences. Especially, as the core and enable technologies will be …
risks can have high consequences. Especially, as the core and enable technologies will be …
Classification of various attacks and their defence mechanism in online social networks: a survey
SR Sahoo, BB Gupta - Enterprise Information Systems, 2019 - Taylor & Francis
Due to the popularity and user friendliness of the Internet, numbers of users of online social
networks (OSNs) and social media have grown significantly. However, globally utilised …
networks (OSNs) and social media have grown significantly. However, globally utilised …
Quantum key distribution for 5g networks: A review, state of art and future directions
MH Adnan, Z Ahmad Zukarnain, NZ Harun - Future Internet, 2022 - mdpi.com
In recent years, 5G networks and services become progressively popular among
telecommunication providers. Simultaneously, the growth in the usage and deployment of …
telecommunication providers. Simultaneously, the growth in the usage and deployment of …
Overview of 5G & beyond security
Network security is a crucial concern when it comes to computation, concerns like threats
can have high consequences, and critical information will be shared with unauthorized …
can have high consequences, and critical information will be shared with unauthorized …
[LIBRO][B] Online social networks security: principles, algorithm, applications, and perspectives
BB Gupta, SR Sahoo - 2021 - taylorfrancis.com
In recent years, virtual meeting technology has become a part of the everyday lives of more
and more people, often with the help of global online social networks (OSNs). These help …
and more people, often with the help of global online social networks (OSNs). These help …
PRECISE: Identity-based private data sharing with conditional proxy re-encryption in online social networks
Q Huang, Y Yang, J Fu - Future Generation Computer Systems, 2018 - Elsevier
Online social networks (OSNs) have become popular around the world due to its openness.
Although cryptographic techniques can provide privacy protection for users in OSNs, several …
Although cryptographic techniques can provide privacy protection for users in OSNs, several …
Attribute-based access control scheme with efficient revocation in cloud computing
Z **a, L Zhang, D Liu - China Communications, 2016 - ieeexplore.ieee.org
Attribute-based encryption (ABE) supports the fine-grained sharing of encrypted data. In
some common designs, attributes are managed by an attribute authority that is supposed to …
some common designs, attributes are managed by an attribute authority that is supposed to …
A novel authorization delegation scheme for multimedia social networks by using proxy re-encryption
W Feng, Z Zhang, J Wang, L Han - Multimedia Tools and Applications, 2016 - Springer
To solve the existing problem of the multimedia social networks platforms, for instance, the
copyrighted or private multimedia content can not be safely shared among users, we …
copyrighted or private multimedia content can not be safely shared among users, we …
[PDF][PDF] Privacy Preservation for eHealth Big Data in Cloud Accessed Using Resource-Constrained Devices: Survey.
KP Kibiwott, F Zhang, K Kimeli Victor, AA Omala… - Int. J. Netw …, 2019 - ijns.jalaxy.com.tw
Mobile technology is proving to offer unprecedented advantage to health professionals by
providing a more efficient transmission and access to health services. However, mobile …
providing a more efficient transmission and access to health services. However, mobile …
Examining the impact of social media advertising using ANOVA analysis
N Meena Zenith, R Radhika - Concurrency and Computation …, 2024 - Wiley Online Library
Social media has become a significant part of daily life and nowadays it has started to turn
out to be common practice for consumers and companies to employ social media to form …
out to be common practice for consumers and companies to employ social media to form …