|
|
|
Ramamurthi Deeptha,Rajeswari Mukesh
Pág. 8 - 14
Single sign-on (SSO) is an emerging and more secure authentication mechanism that enables an authorized user with a single username/password to be authenticated by many service providers in a distributed network system. The existing technique used SSO sc...
ver más
|
|
|
|
|
|
|
V. Belsky,I. Gerasimov,K. Tsaregorodtsev,I. Chizhov
Pág. 1 - 23
?Personal data exchange and disclosure prevention are widespread problems in our digital world. There are a couple of information technologies embedded in the commercial and government processes. People need to exchange their personal information while u...
ver más
|
|
|
|
|
|
|
Xue Jun Li, Maode Ma and Yihan Sun
Modern smart grids are built based on top of advanced computing and networking technologies, where condition monitoring relies on secure cyberphysical connectivity. Over the network infrastructure, transported data containing confidential information, mu...
ver más
|
|
|
|
|
|
|
Bimal Kumar Roy and Anandarup Roy
Secret sharing schemes are widely used to protect data by breaking the secret into pieces and sharing them amongst various members of a party. In this paper, our objective is to produce a repairable ramp scheme that allows for the retrieval of a share th...
ver más
|
|
|
|
|
|
|
Mohammed A. Mohammed, Manel Boujelben and Mohamed Abid
Recently, the advent of blockchain (BC) has sparked a digital revolution in different fields, such as finance, healthcare, and supply chain. It is used by smart healthcare systems to provide transparency and control for personal medical records. However,...
ver más
|
|
|
|
|
|
|
Alexandru-Ioan Florea, Ionut Anghel and Tudor Cioara
The adoption of remote assisted care was accelerated by the COVID-19 pandemic. This type of system acquires data from various sensors, runs analytics to understand people?s activities, behavior, and living problems, and disseminates information with heal...
ver más
|
|
|
|
|
|
|
Meriem Houmer,Mariya Ouaissa,Mariyam Ouaissa,Moulay Lahcen Hasnaoui
Pág. pp. 48 - 64
In Intelligent Transport Systems (ITS), Vehicular Ad-hoc Networks (VANET) play an essential role in improving road safety and traffic efficiency. Nevertheless, due to its special characteristics like high mobility, large size of the network and dynamic t...
ver más
|
|
|
|
|
|
|
Xinpeng Zhang, Chunxiang Xu, Xiaojun Zhang, Taizong Gu, Zhi Geng and Guoping Liu
With the advent of the big data era, cloud data storage and retrieval have become popular for efficient data management in large companies and organizations, thus they can enjoy the on-demand high-quality cloud storage service. Meanwhile, for security re...
ver más
|
|
|
|
|
|
|
Argyrios Sideris and Minas Dasygenis
Information is transmitted between multiple insecure routing hops in text, image, video, and audio. Thus, this multi-hop digital data transfer makes secure transmission with confidentiality and integrity imperative. This protection of the transmitted dat...
ver más
|
|
|
|
|
|
|
Alessia Allevi and Maria Bondani
In the past twenty years many experiments have demonstrated that quantum states of light can be used for secure data transfer, despite the presence of many noise sources. In this paper we investigate, both theoretically and experimentally, the role playe...
ver más
|
|
|
|
|
|
|
Sufian Hameed and Hassan Ahmed Khan
Software Defined Networking (SDN) has proved itself to be a backbone in the new network design and is quickly becoming an industry standard. The idea of separation of control plane and data plane is the key concept behind SDN. SDN not only allows us to p...
ver más
|
|
|
|