Browsing by Subject "Encryption"
Now showing items 1-8 of 8
-
A secure client-side framework for protecting the privacy of health data stored on the cloud
( Institute of Electrical and Electronics Engineers Inc. , 2018 , Conference Paper)In the past decade, Cloud-Computing emerged as a new computing concept with a distributed nature using virtual network and systems. Many businesses rely on this technology to keep their systems running but concerns are ... -
Cryptographic ransomware encryption detection: Survey
( Elsevier , 2023 , Article)The ransomware threat has loomed over our digital life since 1989. Criminals use this type of cyber attack to lock or encrypt victims' data, often coercing them to pay exorbitant amounts in ransom. The damage ransomware ... -
An Efficient Audio Encryption Scheme Based on Finite Fields
( IEEE , 2021 , Article)Finite fields are well-studied algebraic structures with enormous efficient properties which have applications in the fields of cryptology and coding theory. In this study, we proposed a lossless binary Galois field ... -
Entropy analysis and image encryption application based on a new chaotic system crossing a cylinder
( MDPI AG , 2019 , Article)Designing chaotic systems with specific features is a hot topic in nonlinear dynamics. In this study, a novel chaotic system is presented with a unique feature of crossing inside and outside of a cylinder repeatedly. This ... -
EXPLORING CONFIDENTIALITY AND PRIVACY OF IMAGE IN CLOUD COMPUTING
(2017 , Master Thesis)With the increasing popularity of cloud computing, clients are storing their data in cloud servers and are using “software as a service” for computing services. However, clients’ data may be sensitive, critical, and private, ... -
Secure compressive sensing for ECG monitoring
( Elsevier , 2020 , Article)With the proliferation of wearable wireless sensors and adequate communication protocols, the internet of things (IoT) started to shape the healthcare sector into a new frame of connection between patients with health ... -
Secure mHealth IoT data transfer from the patient to the hospital: A three-tier approach
( Institute of Electrical and Electronics Engineers Inc. , 2019 , Article)eHealth and mHealth applications are gaining increasing importance with advances in the IoT and the ubiquity of sensor deployments. Measured IoT mHealth data needs to be captured, transmitted, and stored securely, without ... -
Securing Big Data from Eavesdropping Attacks in SCADA/ICS Network Data Streams through Impulsive Statistical Fingerprinting
( Springer Verlag , 2019 , Conference Paper)While data from Supervisory Control And Data Acquisition (SCADA) systems is sent upstream, it is both the length of pulses as well as their frequency present an excellent opportunity to incorporate statistical fingerprinting. ...