Search
Now showing items 1-10 of 11
A design of firewall based on feedback of intrusion detection system in cloud environment
(
Institute of Electrical and Electronics Engineers Inc.
, 2019 , Conference)
Security is critical to cloud services, this paper introduces a design of firewall, which based on IDS's feedback t change rules in order to detect attack flexible. It combines firewall and Intrusion Detection Systems(IDS) ...
A secure and efficient medical data sharing protocol for cloud-assisted WBAN
(
Institute of Electrical and Electronics Engineers Inc.
, 2019 , Conference)
The cloud-assisted wireless body area network (WBAN) can further the development of the telemedicine, providing larger health data storage space and more powerful computing capabilities for telemedicine. Under the ...
Smart stock exchange market: A secure predictive decentralized model
(
Institute of Electrical and Electronics Engineers Inc.
, 2019 , Conference)
Stock exchanges around the world are exploring the best possible solution that can improve trading efficiency, lower the risks and tighten secu- rity levels. The working and functioning of a stock exchange involves very ...
A novel chaos-based physical layer security transmission scheme for internet of things
(
Institute of Electrical and Electronics Engineers Inc.
, 2019 , Conference)
The Internet of Things (IoT) has attracted much attention in many fields, such as healthcare, transportation, finance and other critical infrastructures. But how to ensure the security of whole IoT system and the privacy ...
An efficient and privacy-preserving energy trading scheme based on blockchain
(
Institute of Electrical and Electronics Engineers Inc.
, 2019 , Conference)
Distributed transaction model has gradually replaced the traditional centralized transaction model and has become the leading direction of development in energy trading. As the underlying support, blockchain technology is ...
A lightweight and privacy-preserving authentication protocol for mobile edge computing
(
Institute of Electrical and Electronics Engineers Inc.
, 2019 , Conference)
With the advent of the Internet-of-Things (IoT), vehicular networks and cyber-physical systems, the need for real-time data processing and analysis has emerged as an essential pre-requite for customers' satisfaction. In ...
Cloud database encryption technology based on combinatorial encryption
(
Institute of Electrical and Electronics Engineers Inc.
, 2019 , Conference)
Traditional cloud database directly stores user plaintext information, information security is directly related to the security of Cloud server, which will create a great security risk. The user's information security is ...
Security and privacy in emerging networks: Part 1 [Guest Editorial]
(
IEEE
, 2015 , Article)
With the recent advancements in networking technologies, some new emerging networks are being implemented that have the potential to be deployed broadly and on a large scale in the near future. In the wired domain, these ...
Implementation and Analysis of Reward Functions under Different Traffic Models for Distributed DSA Systems
(
IEEE
, 2015 , Article)
In this paper, we implement and analyze a resource allocation protocol for distributed dynamic spectrum allocation (DSA) systems. The DSA protocol is a learning-based protocol that allows secondary users (SU) to exploit ...
A Survey on Energy Harvesting and Integrated Data Sharing in Wireless Body Area Networks
(
SAGE publications
, 2015 , Article)
Wireless body area networks (WBANs) are important branches of wireless sensor networks (WSNs). They promise unobtrusive ambulatory health monitoring for real-time updates of patients' medical records that have aroused ...