Search
Now showing items 31-40 of 48
Key-policy attribute-based encryption with keyword search in virtualized environments
(
Institute of Electrical and Electronics Engineers Inc.
, 2020 , Article)
Cloud computing is a model for convenient, on-demand network access to virtualized environments of configurable computing resources. It is challenging to search data encrypted and stored in cloud storage servers. Searchable ...
Selection of effective machine learning algorithm and Bot-IoT attacks traffic identification for internet of things in smart city
(
Elsevier B.V.
, 2020 , Article)
Identifying cyber attacks traffic is very important for the Internet of things (IoT) security in smart city. Recently, the research community in the field of IoT Security endeavor hard to build anomaly, intrusion and cyber ...
Cluster-based Cooperative Multicast for Multimedia Data Dissemination in Vehicular Networks
(
Institute of Electrical and Electronics Engineers Inc.
, 2020 , Conference Paper)
With the development of communication technologies, vehicular network applications have evolved from basic traffic safety and efficiency applications to information and entertainment applications. The implementation of ...
A Differentially Private Classification Algorithm with High Utility for Wireless Body Area Networks
(
Institute of Electrical and Electronics Engineers Inc.
, 2020 , Conference Paper)
The advancement of the wireless body area networks (WBAN) and sensor technologies allows us to collect a variety of physiological and behavioral data from human body. And appropriate application of machine learning methods ...
FBIA: A Fog-Based Identity Authentication Scheme for Privacy Preservation in Internet of Vehicles
(
Institute of Electrical and Electronics Engineers Inc.
, 2020 , Article)
In recent years, the Internet of vehicles (IoV) has become an indispensable part of wireless communication. To protect users' privacy and communication security, an increasing number of scholars have focused on studying ...
A Blockchain-SDN-Enabled Internet of Vehicles Environment for Fog Computing and 5G Networks
(
Institute of Electrical and Electronics Engineers Inc.
, 2020 , Article)
The goal of intelligent transport systems (ITSs) is to enhance the network performance of vehicular ad hoc networks (VANETs). Even though it presents new opportunities to the Internet of Vehicles (IoV) environment, there ...
Blockchain-Assisted Secure Device Authentication for Cross-Domain Industrial IoT
(
Institute of Electrical and Electronics Engineers Inc.
, 2020 , Article)
Industrial Internet of Things (IIoT) is considered as one of the most promising revolutionary technologies to prompt smart manufacturing and increase productivity. With manufacturing being more complicated and sophisticated, ...
Blockchain-Based Anonymous Authentication with Selective Revocation for Smart Industrial Applications
(
IEEE Computer Society
, 2020 , Article)
Personal privacy disclosure is one of the most serious challenges in smart industrial applications. Anonymous authentication is an effective solution to protect personal privacy. However, the existing anonymous credential ...
An adaptive cache management approach in ICN with pre-filter queues
(
Elsevier B.V.
, 2020 , Article)
In Information-Centric Networking (ICN), transmission does not depend on the ends of communication, but on the content itself. In-network cache plays an important role in ICN, it empowers nodes in ICN better mobility. It ...
A Distributed Deep Learning System for Web Attack Detection on Edge Devices
(
IEEE Computer Society
, 2020 , Article)
With the development of Internet of Things (IoT) and cloud technologies, numerous IoT devices and sensors transmit huge amounts of data to cloud data centers for further processing. While providing us considerable convenience, ...