A survey on security and privacy of 5G technologies: Potential solutions, recent advancements, and future directions

R Khan, P Kumar, DNK Jayakody… - … Surveys & Tutorials, 2019 - ieeexplore.ieee.org
Security has become the primary concern in many telecommunications industries today as
risks can have high consequences. Especially, as the core and enable technologies will be …

Classification of various attacks and their defence mechanism in online social networks: a survey

SR Sahoo, BB Gupta - Enterprise Information Systems, 2019 - Taylor & Francis
Due to the popularity and user friendliness of the Internet, numbers of users of online social
networks (OSNs) and social media have grown significantly. However, globally utilised …

Quantum key distribution for 5g networks: A review, state of art and future directions

MH Adnan, Z Ahmad Zukarnain, NZ Harun - Future Internet, 2022 - mdpi.com
In recent years, 5G networks and services become progressively popular among
telecommunication providers. Simultaneously, the growth in the usage and deployment of …

Overview of 5G & beyond security

F Shokoor, W Shafik, SM Matinkhah - EAI Endorsed Transactions on …, 2022 - eudl.eu
Network security is a crucial concern when it comes to computation, concerns like threats
can have high consequences, and critical information will be shared with unauthorized …

[LIBRO][B] Online social networks security: principles, algorithm, applications, and perspectives

BB Gupta, SR Sahoo - 2021 - taylorfrancis.com
In recent years, virtual meeting technology has become a part of the everyday lives of more
and more people, often with the help of global online social networks (OSNs). These help …

PRECISE: Identity-based private data sharing with conditional proxy re-encryption in online social networks

Q Huang, Y Yang, J Fu - Future Generation Computer Systems, 2018 - Elsevier
Online social networks (OSNs) have become popular around the world due to its openness.
Although cryptographic techniques can provide privacy protection for users in OSNs, several …

Attribute-based access control scheme with efficient revocation in cloud computing

Z **a, L Zhang, D Liu - China Communications, 2016 - ieeexplore.ieee.org
Attribute-based encryption (ABE) supports the fine-grained sharing of encrypted data. In
some common designs, attributes are managed by an attribute authority that is supposed to …

A novel authorization delegation scheme for multimedia social networks by using proxy re-encryption

W Feng, Z Zhang, J Wang, L Han - Multimedia Tools and Applications, 2016 - Springer
To solve the existing problem of the multimedia social networks platforms, for instance, the
copyrighted or private multimedia content can not be safely shared among users, we …

[PDF][PDF] Privacy Preservation for eHealth Big Data in Cloud Accessed Using Resource-Constrained Devices: Survey.

KP Kibiwott, F Zhang, K Kimeli Victor, AA Omala… - Int. J. Netw …, 2019 - ijns.jalaxy.com.tw
Mobile technology is proving to offer unprecedented advantage to health professionals by
providing a more efficient transmission and access to health services. However, mobile …

Examining the impact of social media advertising using ANOVA analysis

N Meena Zenith, R Radhika - Concurrency and Computation …, 2024 - Wiley Online Library
Social media has become a significant part of daily life and nowadays it has started to turn
out to be common practice for consumers and companies to employ social media to form …