405   Artículos

 
en línea
Mamoon Riaz, Hammad Dilpazir, Sundus Naseer, Hasan Mahmood, Asim Anwar, Junaid Khan, Ian B. Benitez and Tanveer Ahmad    
In the past few decades, the transmission of data over an unsecure channel has resulted in an increased rate of hacking. The requirement to make multimedia data more secure is increasing day by day. Numerous algorithms have been developed to improve effi... ver más
Revista: Information    Formato: Electrónico

 
en línea
Xingchen Wang and Peng Li    
With the widespread adoption of cloud computing, the face verification process often requires the client to upload the face to an untrusted cloud server to obtain the verification results. Privacy leakage issues may arise if the client?s private informat... ver más
Revista: Information    Formato: Electrónico

 
en línea
Md Momin Al Aziz, Md Toufique Morshed Tamal and Noman Mohammed    
Fully homomorphic encryption (FHE) cryptographic systems enable limitless computations over encrypted data, providing solutions to many of today?s data security problems. While effective FHE platforms can address modern data security concerns in unsecure... ver más
Revista: Information    Formato: Electrónico

 
en línea
Meijuan Huang, Yutian Liu, Bo Yang, Yanqi Zhao and Mingrui Zhang    
Revocable attribute-based encryption (RABE) provides greater flexibility and fine-grained access control for data sharing. However, the revocation process for most RABE schemes today is performed by the cloud storage provider (CSP). Since the CSP is an h... ver más
Revista: Information    Formato: Electrónico

 
en línea
Ali Eghmazi, Mohammadhossein Ataei, René Jr Landry and Guy Chevrette    
The Internet of Things (IoT) is a technology that can connect billions of devices or ?things? to other devices (machine to machine) or even to people via an existing infrastructure. IoT applications in real-world scenarios include smart cities, smart hou... ver más
Revista: IoT    Formato: Electrónico

 
en línea
Tse-Chuan Hsu    
With the rapid development of the Internet of Things (IoT) in recent years, many IoT devices use communication systems to transmit data. Data packets are inevitably at risk of tampering during data transmission, which can lead to information errors and d... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Bahaa Yamany, Mahmoud Said Elsayed, Anca D. Jurcut, Nashwa Abdelbaki and Marianne A. Azer    
Ransomware is a type of malicious software that encrypts a victim?s files and demands payment in exchange for the decryption key. It is a rapidly growing and evolving threat that has caused significant damage and disruption to individuals and organizatio... ver más
Revista: Information    Formato: Electrónico

 
en línea
Mahmoud Elkhodr, Samiya Khan and Ergun Gide    
In the modern digital landscape of the Internet of Things (IoT), data interoperability and heterogeneity present critical challenges, particularly with the increasing complexity of IoT systems and networks. Addressing these challenges, while ensuring dat... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Jun Li, Chenyang Zhang, Jianyi Zhang and Yanhua Shao    
To address the challenge of balancing privacy protection with regulatory oversight in blockchain transactions, we propose a regulatable privacy protection scheme for blockchain transactions. Our scheme utilizes probabilistic public-key encryption to obsc... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Burhan Ul Islam Khan, Khang Wen Goh, Mohammad Shuaib Mir, Nur Fatin Liyana Mohd Rosely, Aabid Ahmad Mir and Mesith Chaimanee    
As the Internet of Things (IoT) continues to revolutionize value-added services, its conventional architecture exhibits persistent scalability and security vulnerabilities, jeopardizing the trustworthiness of IoT-based services. These architectural limit... ver más
Revista: Information    Formato: Electrónico

« Anterior     Página: 1 de 23     Siguiente »