|
|
|
Farid Lalem, Abdelkader Laouid, Mostefa Kara, Mohammed Al-Khalidi and Amna Eleyan
Digital signature schemes are practical mechanisms for achieving message integrity, authenticity, and non-repudiation. Several asymmetric encryption techniques have been proposed in the literature, each with its proper limitations. RSA and El Gamal prove...
ver más
|
|
|
|
|
|
|
Peter Kieseberg, Sebastian Schrittwieser and Edgar Weippl
The data market concept has gained a lot of momentum in recent years, fuelled by initiatives to set up such markets, e.g., on the European level. Still, the typical data market concept aims at providing a centralised platform with all of its positive and...
ver más
|
|
|
|
|
|
|
Ramamurthi Deeptha,Rajeswari Mukesh
Pág. 8 - 14
Single sign-on (SSO) is an emerging and more secure authentication mechanism that enables an authorized user with a single username/password to be authenticated by many service providers in a distributed network system. The existing technique used SSO sc...
ver más
|
|
|
|
|
|
|
Mohan Naik Ramachandra, Madala Srinivasa Rao, Wen Cheng Lai, Bidare Divakarachari Parameshachari, Jayachandra Ananda Babu and Kivudujogappa Lingappa Hemalatha
In recent decades, big data analysis has become the most important research topic. Hence, big data security offers Cloud application security and monitoring to host highly sensitive data to support Cloud platforms. However, the privacy and security of bi...
ver más
|
|
|
|
|
|
|
Bao Zhou, Junsan Zhao, Guoping Chen and Ying Yin
With the popularity of spatiotemporal big data applications, more and more sensitive data are generated by users, and the sharing and secure storage of spatiotemporal big data are faced with many challenges. In response to these challenges, the present p...
ver más
|
|
|
|
|
|
|
Novi Aryani Fitri, M. Udin Harun Al Rasyid, Amang Sudarsono
Pág. 151 - 175
Information on medical record is very sensitive data due to the number of confidential information about a patient's condition. Therefore, a secure and reliable storage mechanism is needed so that the data remains original without any changes during it w...
ver más
|
|
|
|
|
|
|
Mira Lee and Minhye Seo
Cloud storage services have become indispensable in resolving the constraints of local storage and ensuring data accessibility from anywhere at any time. Data deduplication technology is utilized to decrease storage space and bandwidth requirements. This...
ver más
|
|
|
|
|
|
|
Muhammad Bin Saif, Sara Migliorini and Fausto Spoto
Blockchain technology has been successfully applied in recent years to promote the immutability, traceability, and authenticity of previously collected and stored data. However, the amount of data stored in the blockchain is usually limited for economic ...
ver más
|
|
|
|
|
|
|
Mahmoud Elkhodr, Samiya Khan and Ergun Gide
In the modern digital landscape of the Internet of Things (IoT), data interoperability and heterogeneity present critical challenges, particularly with the increasing complexity of IoT systems and networks. Addressing these challenges, while ensuring dat...
ver más
|
|
|
|
|
|
|
Ivan Nedyalkov
This paper proposes the use of the GNS3 IP network modeling platform to study/verify whether the exchanged information between power electronic devices and a control center (Monitoring and Control Centre) is secure. For the purpose of this work, a power ...
ver más
|
|
|
|
|
|
|
Emmanuel A. Adeniyi, Peace Busola Falola, Mashael S. Maashi, Mohammed Aljebreen and Salil Bharany
With the explosion of connected devices linked to one another, the amount of transmitted data grows day by day, posing new problems in terms of information security, such as unauthorized access to users? credentials and sensitive information. Therefore, ...
ver más
|
|
|
|
|
|
|
Peng Xi, Xinglong Zhang, Lian Wang, Wenjuan Liu and Shaoliang Peng
Medical data contains multiple records of patient data that are important for subsequent treatment and future research. However, it needs to be stored and shared securely to protect the privacy of the data. Blockchain is widely used in the management of ...
ver más
|
|
|
|
|
|
|
Shamim Younas, Faisal Rehman, Tahir Maqsood, Saad Mustafa, Adnan Akhunzada and Abdullah Gani
Vehicle ad hoc networks (VANETs) are vital towards the success and comfort of self-driving as well as semi-automobile vehicles. Such vehicles rely heavily on data management and the exchange of Cooperative Awareness Messages (CAMs) for external communica...
ver más
|
|
|
|
|
|
|
Febby Ronaldo, Amang Sudarsono, Dadet Pramadihanto
Pág. 120 - 135
Drone technology is considered the most effective solution for the improvement of various industrial fields. As a delivery service, drones need a secure communication system that is also able to manage all of the information data in real-time. Howe...
ver más
|
|
|
|
|
|
|
Febby Ronaldo, Amang Sudarsono, Dadet Pramadihanto
Pág. 120 - 135
Drone technology is considered the most effective solution for the improvement of various industrial fields. As a delivery service, drones need a secure communication system that is also able to manage all of the information data in real-time. Howe...
ver más
|
|
|
|
|
|
|
Muhammad Firdaus and Kyung-Hyune Rhee
The conventional architecture of vehicular ad hoc networks (VANETs) with a centralized approach has difficulty overcoming the increasing complexity of intelligent transportation system (ITS) applications as well as challenges in providing large amounts o...
ver más
|
|
|
|
|
|
|
Nishu Gupta, Ravikanti Manaswini, Bongaram Saikrishna, Francisco Silva and Ariel Teles
The amalgamation of Vehicular Ad hoc Network (VANET) with the Internet of Things (IoT) leads to the concept of the Internet of Vehicles (IoV). IoV forms a solid backbone for Intelligent Transportation Systems (ITS), which paves the way for technologies t...
ver más
|
|
|
|
|
|
|
Anindya Dwi Putri Islamidina, Amang Sudarsono, Titon Dutono
Pág. 102 - 125
Nowadays traveling is the activity that everyone likes the most, but sometimes there is one traveling member who is lost and confused looking for the location of the other members. When traveling, they must bring a smartphone because of its small size an...
ver más
|
|
|
|
|
|
|
Seonghyeon Gong, Abir EL Azzaoui, Jeonghun Cha and Jong Hyuk Park
The service-based architecture of the Fifth Generation(5G) had combined the services and security architectures and enhanced the authentication process of services to expand the coverage of the network, including heterogeneous devices. This architecture ...
ver más
|
|
|
|
|
|
|
K.Ruben Raju,Danekula Rajya Lakshmi,Prof.Dr.G.Manoj Someswar
The authors have plagiarized part of a paper that had already appeared in IEEE Transactions on Cloud Computing, 1?1. doi:10.1109/tcc.2016.2545668. One of the conditions of submission of a paper for publication is that authors declare explicitly that thei...
ver más
|
|
|
|