A survey on lattice‐based security and authentication schemes for smart‐grid networks in the post‐quantum era
The present scenario witnesses “the second quantum revolution,” which has enabled the
development of revolutionary novel quantum tools. Quantum computing endeavors to …
development of revolutionary novel quantum tools. Quantum computing endeavors to …
A privacy-preserving aggregation scheme based on negative survey for vehicle fuel consumption data
W Yang, X Chen, Z **ong, Z Xu, G Liu, X Zhang - Information sciences, 2021 - Elsevier
The vehicle fuel consumption gauge is a vehicle's basic device that usually records the
instantaneous as well as average fuel consumption of the vehicle, which brings a lot of …
instantaneous as well as average fuel consumption of the vehicle, which brings a lot of …
[PDF][PDF] Detecting Intrusions in Computer Network Traffic with Machine Learning Approaches.
Security has been a crucial factor in this modern digital period due to the rapid development
of information technology, which is followed by serious computer crimes that, in turn, led to …
of information technology, which is followed by serious computer crimes that, in turn, led to …
Research perspectives on fully homomorphic encryption models for cloud sector
As there is a continuous delivery of big data, the researchers are showing interest in the
applications of cloud computing concerning privacy, and security. On the other hand, many …
applications of cloud computing concerning privacy, and security. On the other hand, many …
The challenges of privacy and access control as key perspectives for the future electric smart grid
The Electric Smart Grid (ESG) is referred to as the next generation electricity power network.
The ESG is an intelligent critical infrastructure subject to various security vulnerabilities and …
The ESG is an intelligent critical infrastructure subject to various security vulnerabilities and …
Improving intrusion detection system by estimating parameters of random forest in Boruta
To overcome the security problem of computer networks, the Intrusion Detection System
(IDS) is developed. It is intended to identify an attack. Various types of IDS are built …
(IDS) is developed. It is intended to identify an attack. Various types of IDS are built …
Data hiding scheme based on quad general difference expansion cluster
For some periods, information technology has developed, but there are some issues with its
data security. For this reason, exploring the data hiding method is relevant, which is an …
data security. For this reason, exploring the data hiding method is relevant, which is an …
LPM2DA: a lattice-based privacy-preserving multi-functional and multi-dimensional data aggregation scheme for smart grid
The smart grid provides efficient transmission of energy and data. However, the frequent
gathering of users' consumption data discloses users' privacy. Plenty of data aggregation …
gathering of users' consumption data discloses users' privacy. Plenty of data aggregation …
Pearson correlation attribute evaluation-based feature selection for intrusion detection system
IDS helps to overcome the network attack by taking appropriate preventive measures. The
data mining method has good adaptability to new attack types; however, it consumes much …
data mining method has good adaptability to new attack types; however, it consumes much …
Efficient privacy-preserving anonymous authentication scheme for human predictive online education system
In recent years, online education systems (OES) are improved tremendously with the
development of information communication technology. Also, OES provides the opportunity …
development of information communication technology. Also, OES provides the opportunity …