A survey on lattice‐based security and authentication schemes for smart‐grid networks in the post‐quantum era

H Shekhawat, DS Gupta - Concurrency and Computation …, 2024 - Wiley Online Library
The present scenario witnesses “the second quantum revolution,” which has enabled the
development of revolutionary novel quantum tools. Quantum computing endeavors to …

A privacy-preserving aggregation scheme based on negative survey for vehicle fuel consumption data

W Yang, X Chen, Z **ong, Z Xu, G Liu, X Zhang - Information sciences, 2021 - Elsevier
The vehicle fuel consumption gauge is a vehicle's basic device that usually records the
instantaneous as well as average fuel consumption of the vehicle, which brings a lot of …

[PDF][PDF] Detecting Intrusions in Computer Network Traffic with Machine Learning Approaches.

P Maniriho, LJ Mahoro, E Niyigaba, Z Bizimana… - International Journal of …, 2020 - inass.org
Security has been a crucial factor in this modern digital period due to the rapid development
of information technology, which is followed by serious computer crimes that, in turn, led to …

Research perspectives on fully homomorphic encryption models for cloud sector

S Mittal, KR Ramkumar - Journal of Computer Security, 2021 - journals.sagepub.com
As there is a continuous delivery of big data, the researchers are showing interest in the
applications of cloud computing concerning privacy, and security. On the other hand, many …

The challenges of privacy and access control as key perspectives for the future electric smart grid

A Triantafyllou, JAP Jimenez… - IEEE Open Journal …, 2020 - ieeexplore.ieee.org
The Electric Smart Grid (ESG) is referred to as the next generation electricity power network.
The ESG is an intelligent critical infrastructure subject to various security vulnerabilities and …

Improving intrusion detection system by estimating parameters of random forest in Boruta

AN Iman, T Ahmad - 2020 International Conference on Smart …, 2020 - ieeexplore.ieee.org
To overcome the security problem of computer networks, the Intrusion Detection System
(IDS) is developed. It is intended to identify an attack. Various types of IDS are built …

Data hiding scheme based on quad general difference expansion cluster

AJ Ilham, T Ahmad, NJ De La Croix, P Maniriho… - 2022 - opal.latrobe.edu.au
For some periods, information technology has developed, but there are some issues with its
data security. For this reason, exploring the data hiding method is relevant, which is an …

LPM2DA: a lattice-based privacy-preserving multi-functional and multi-dimensional data aggregation scheme for smart grid

S Darzi, B Akhbari, H Khodaiemehr - Cluster Computing, 2022 - Springer
The smart grid provides efficient transmission of energy and data. However, the frequent
gathering of users' consumption data discloses users' privacy. Plenty of data aggregation …

Pearson correlation attribute evaluation-based feature selection for intrusion detection system

Y Sugianela, T Ahmad - 2020 International Conference on …, 2020 - ieeexplore.ieee.org
IDS helps to overcome the network attack by taking appropriate preventive measures. The
data mining method has good adaptability to new attack types; however, it consumes much …

Efficient privacy-preserving anonymous authentication scheme for human predictive online education system

S Jegadeesan, MS Obaidat, P Vijayakumar, M Azees… - Cluster …, 2022 - Springer
In recent years, online education systems (OES) are improved tremendously with the
development of information communication technology. Also, OES provides the opportunity …