بحث بسيط
السجلات المعروضة 131 -- 137 من 137
A design of firewall based on feedback of intrusion detection system in cloud environment
(
Institute of Electrical and Electronics Engineers Inc.
, 2019 , Conference Paper)
Security is critical to cloud services, this paper introduces a design of firewall, which based on IDS's feedback t change rules in order to detect attack flexible. It combines firewall and Intrusion Detection Systems(IDS) ...
An efficient and privacy-preserving energy trading scheme based on blockchain
(
Institute of Electrical and Electronics Engineers Inc.
, 2019 , Conference Paper)
Distributed transaction model has gradually replaced the traditional centralized transaction model and has become the leading direction of development in energy trading. As the underlying support, blockchain technology is ...
A secure and efficient medical data sharing protocol for cloud-assisted WBAN
(
Institute of Electrical and Electronics Engineers Inc.
, 2019 , Conference Paper)
The cloud-assisted wireless body area network (WBAN) can further the development of the telemedicine, providing larger health data storage space and more powerful computing capabilities for telemedicine. Under the ...
Cloud database encryption technology based on combinatorial encryption
(
Institute of Electrical and Electronics Engineers Inc.
, 2019 , Conference Paper)
Traditional cloud database directly stores user plaintext information, information security is directly related to the security of Cloud server, which will create a great security risk. The user's information security is ...
Smart stock exchange market: A secure predictive decentralized model
(
Institute of Electrical and Electronics Engineers Inc.
, 2019 , Conference Paper)
Stock exchanges around the world are exploring the best possible solution that can improve trading efficiency, lower the risks and tighten secu- rity levels. The working and functioning of a stock exchange involves very ...
Energy-Harvesting Based Jammer Localization: A Battery-Free Approach in Wireless Sensor Networks
(
IEEE
, 2022 , Conference Paper)
Wireless enabling technologies in critical infrastructures are increasing the efficiency of communications. Most of these technologies are vulnerable to jamming attacks. Jamming attacks are among the most effective ...
Exploiting Spatial Correlations: Group Key Generation for Secure IoT Device Networks
(
Institute of Electrical and Electronics Engineers Inc.
, 2023 , Conference Paper)
With the exponential growth in IoT devices, especially in healthcare systems, where multiple devices are attributed to one person, the need for a secure and effective group secret key (GSK) generation is intrinsic. GSKs ...