Verifiable Searchable Encryption Framework Against Insider Keyword-Guessing Attack in Cloud Storage | 1 | 0.34 | 2022 |
Timestamp Scheme to Mitigate Replay Attacks in Secure ZigBee Networks | 0 | 0.34 | 2022 |
Artificial intelligence in cyber security: research advances, challenges, and opportunities | 2 | 0.36 | 2022 |
DDCA: A Distortion Drift-Based Cost Assignment Method for Adaptive Video Steganography in the Transform Domain | 0 | 0.34 | 2022 |
SecureIoD: A Secure Data Collection and Storage Mechanism for Internet of Drones | 0 | 0.34 | 2022 |
Privacy, accuracy, and model fairness trade-offs in federated learning | 0 | 0.34 | 2022 |
CoinLayering: An Efficient Coin Mixing Scheme for Large Scale Bitcoin Transactions | 0 | 0.34 | 2022 |
Privacy-Preserving Byzantine-Robust Federated Learning via Blockchain Systems | 0 | 0.34 | 2022 |
Achieving Efficient and Privacy-Preserving Cross-Domain Big Data Deduplication in Cloud | 2 | 0.41 | 2022 |
Multicopy and Multiserver Provable Data Possession for Cloud-Based IoT | 0 | 0.34 | 2022 |
Edge Computing and Lightning Network Empowered Secure Food Supply Management | 1 | 0.36 | 2022 |
A Redactable Blockchain Framework for Secure Federated Learning in Industrial Internet of Things | 0 | 0.34 | 2022 |
On the Design of Mutual Authentication and Key Agreement Protocol in Internet of Vehicles-Enabled Intelligent Transportation System | 4 | 0.37 | 2021 |
Time-Efficient Ensemble Learning with Sample Exchange for Edge Computing | 2 | 0.38 | 2021 |
Cross-domain authentication for 5G-enabled UAVs: a blockchain approach | 0 | 0.34 | 2021 |
Obfp: Optimized Blockchain-Based Fair Payment For Outsourcing Computations In Cloud Computing | 0 | 0.34 | 2021 |
A multi-type and decentralized data transaction scheme based on smart contracts and digital watermarks | 1 | 0.35 | 2021 |
Editorial for accountability and privacy issues in blockchain and cryptocurrency | 0 | 0.34 | 2021 |
Multi-Authority Attribute-Based Keyword Search over Encrypted Cloud Data | 4 | 0.37 | 2021 |
Blockchain-based multi-party proof of assets with privacy preservation | 1 | 0.35 | 2021 |
Multi-Area Throughput and Energy Optimization of UAV-aided Cellular Networks Powered by Solar Panels and Grid | 3 | 0.38 | 2021 |
R-Dedup: Secure client-side deduplication for encrypted data without involving a third-party entity | 0 | 0.34 | 2020 |
Blockchain-Based Anonymous Authentication With Key Management for Smart Grid Edge Computing Infrastructure. | 14 | 0.55 | 2020 |
A Review Of Supervised Classification Based On Contrast Patterns: Applications, Trends, And Challenges | 2 | 0.36 | 2020 |
White-Box Implementation of Shamir’s Identity-Based Signature Scheme | 0 | 0.34 | 2020 |
IoT Botnet Forensics: A Comprehensive Digital Forensic Case Study on Mirai Botnet Servers | 1 | 0.36 | 2020 |
An Adaptive Grid Frequency Support Mechanism For Energy Management In Cloud Data Centers | 0 | 0.34 | 2020 |
An Energy-Efficient SDN Controller Architecture for IoT Networks With Blockchain-Based Security | 11 | 0.48 | 2020 |
MMDA: Multidimensional and Multidirectional Data Aggregation for Edge Computing-Enhanced IoT | 2 | 0.36 | 2020 |
A multiview learning method for malware threat hunting: windows, IoT and android as case studies | 2 | 0.36 | 2020 |
P4-to-Blockchain: A Secure Blockchain-enabled Packet Parser for Software Defined Networking | 6 | 0.43 | 2020 |
An Efficient Privacy-Preserving Protocol for Computing k-th Minimum Value in P2P Networks | 1 | 0.36 | 2020 |
Privacy-Preserving Tensor Decomposition Over Encrypted Data in a Federated Cloud Environment | 7 | 0.42 | 2020 |
Privacy Concerns and Benefits of Engagement with Social Media-enabled Apps: A Privacy Calculus Perspective | 0 | 0.34 | 2020 |
A task scheduling algorithm considering game theory designed for energy management in cloud computing | 11 | 0.58 | 2020 |
A task scheduling algorithm considering game theory designed for energy management in cloud computing | 11 | 0.58 | 2020 |
Secure Range Search over Encrypted Uncertain IoT Outsourced Data | 7 | 0.45 | 2019 |
Blockchain based secure data sharing system for Internet of vehicles: A position paper. | 5 | 0.39 | 2019 |
Game theoretic security of quantum bit commitment. | 0 | 0.34 | 2019 |
Energy Efficient Decentralized Authentication In Internet Of Underwater Things Using Blockchain | 0 | 0.34 | 2019 |
On Data Sovereignty in Cloud-based Computation Offloading for Smart Cities Applications | 0 | 0.34 | 2019 |
Fuzzy Identity-Based Data Integrity Auditing for Reliable Cloud Storage Systems | 17 | 0.62 | 2019 |
A Novel Social Situation Analytics-Based Recommendation Algorithm For Multimedia Social Networks | 0 | 0.34 | 2019 |
Improved t-SNE based manifold dimensional reduction for remote sensing data processing | 3 | 0.41 | 2019 |
Parking Management: A Blockchain-Based Privacy-Preserving System | 3 | 0.41 | 2019 |
Secure Key Agreement and Key Protection for Mobile Device User Authentication. | 9 | 0.43 | 2019 |
Enabling verifiable multiple keywords search over encrypted cloud data. | 8 | 0.42 | 2018 |
Fair Resource Allocation in an Intrusion-Detection System for Edge Computing: Ensuring the Security of Internet of Things Devices. | 9 | 0.56 | 2018 |
Efficient Revocable Id-Based Encryption With Cloud Revocation Server | 0 | 0.34 | 2018 |
Towards Better Ocular Recognition for Secure Real-World Applications | 1 | 0.41 | 2018 |