Browsing Network & Distributed Systems by Type "Conference Paper"
Now showing items 1-20 of 21
-
A Blockchain-Based Security Scheme for Vehicular Ad Hoc Networks in Smart Cities
( Institute of Electrical and Electronics Engineers Inc. , 2021 , Conference Paper)The development of Vehicular Ad Hoc Networks (VANET) has brought many advantages to facilitate the deployment of the Intelligent Transportation System (ITS). However, without proper protection, VANETs can be vulnerable to ... -
A Practical Universal Consortium Blockchain Paradigm for Patient Data Portability on the Cloud Utilizing Delegated Identity Management
( Institute of Electrical and Electronics Engineers Inc. , 2020 , Conference Paper)This paper presents a blockchain system that exploits the base modular features of the Hyperledger Fabric framework to allow for a new, patient-centric, practical data portability paradigm. The system empowers patients by ... -
A Reconfigurable Multipurpose SoC Mobile Platform for metal detection
( Hamad bin Khalifa University Press (HBKU Press) , 2018 , Conference Paper)Background and Objectives One of the key problems in mobile robotics is the ability to understand and analyze the surrounding environment in a useful way. This is especially important in dangerous applications where human ... -
Almost BPXOR Coding Technique for Tolerating Three Disk Failures in RAID7 Architectures
( Hamad bin Khalifa University Press (HBKU Press) , 2018 , Conference Paper)Redundant Array of Independent Disks (RAID) storage architectures provide protection of digital infrastructure against potential disks failures. For example, RAID-5 and RAID-6 architectures provide protection against one ... -
CloudSafe: A tool for an automated security analysis for cloud computing
( Institute of Electrical and Electronics Engineers Inc. , 2019 , Conference Paper)Cloud computing has been adopted widely, providing on-demand computing resources to improve performance and reduce operational costs. However, these new functionalities also bring new ways to exploit the cloud computing ... -
Deep Reservoir Computing Based Random Vector Functional Link for Non-sequential Classification
( Institute of Electrical and Electronics Engineers Inc. , 2022 , Conference Paper)Reservoir Computing (RC) is well-suited for simpler sequential tasks which require inexpensive, rapid training, and the Echo State Network (ESN) plays a significant role in RC. In this article, we proposed variations of ... -
Design and Implementation of a Threat-Specific Security Risk Assessment Tool
( Institute of Electrical and Electronics Engineers Inc. , 2020 , Conference Paper)Security threats posed to individual cloud computing clients vary depending on their specific security requirements. However, Cloud Providers apply generic security risk assessment approaches which result do not consider ... -
DQN based Blockchain Data Storage in Resource-constrained IoT System
( Institute of Electrical and Electronics Engineers Inc. , 2023 , Conference Paper)Applying blockchain technology in the Internet of Things (IoT) systems to realize massive data storage is a promising technology, which can eliminate the dependence of IoT on central servers and protect data security ... -
Empirical performance evaluation of QUIC protocol for Tor anonymity network
( Institute of Electrical and Electronics Engineers Inc. , 2019 , Conference Paper)Tor's anonymity network is one of the most widely used anonymity networks online, it consists of thousands of routers run by volunteers. Tor preserves the anonymity of its users by relaying the traffic through a number of ... -
Empowering users of cloud computing on data confidentiality
( IEEE , 2014 , Conference Paper)Cloud networking is an integral part of interconnected data centres operated in cloud environment. Cloud users heavily rely on cloud networking to transmit to and receive data from data centres. In this context, we explore ... -
An Enhanced Multi-Phase Stochastic Differential Evolution Framework for Numerical Optimization
( Institute of Electrical and Electronics Engineers Inc. , 2022 , Conference Paper)Real-life problems can be expressed as optimization problems. These problems pose a challenge for researchers to design efficient algorithms that are capable of finding optimal solutions with the least budget. Stochastic ... -
Improved Handshaking Procedures for Transport Layer Security in Software Defined Networks
( Institute of Electrical and Electronics Engineers Inc. , 2021 , Conference Paper)Software defined networking (SDN) has emerged as a new technology to enhance the flexibility, resilience, and automated centralized management of a network. Recently several reports have identified possible vulnerabilities, ... -
Minimum Variance Embedded Random Vector Functional Link Network with Privileged Information
( Institute of Electrical and Electronics Engineers Inc. , 2022 , Conference Paper)A teacher in a school plays significant role in classroom while teaching the students. Similarly, learning via privileged information (LUPI) gives extra information generated by a teacher to 'teach' the learning algorithm ... -
Security-Driven Performance Analysis of Lightweight Cryptography for Energy Efficiency Applications
( IEEE , 2024 , Conference Paper)This paper provides a comprehensive analysis of the security-centric performance of the Lightweight Cryptography (LWC) algorithms ASCON, TinyJambu, and Xoodyak, finalists in the NIST standardization process, through their ... -
Situation Awareness Recognition Using EEG and Eye-Tracking data: a pilot study
( Institute of Electrical and Electronics Engineers Inc. , 2022 , Conference Paper)Since situation awareness (SA) plays an important role in many fields, the measure of SA is one of the most concerning problems. Using physiological signals to evaluate SA is becoming a popular research topic because of ... -
A Testbed Implementation of a Biometric Identity-Based Encryption for IoMT-enabled Healthcare System
( Association for Computing Machinery , 2021 , Conference Paper)Historically, health data was stored locally on the hospital's server as patient health records, and we had to rely on the planned check-up during doctor's visits. Now, we can monitor health continuously and in real-time. ... -
The Future of Aerial Communications: A Survey of IRS-Enhanced UAV Communication Technologies
( IEEE , 2024 , Conference Paper)The advent of Intelligent Reflecting Surfaces (IRS) and Unmanned Aerial Vehicles (UAVs) is setting a new benchmark in the field of wireless communications. IRS, with their groundbreaking ability to manipulate electromagnetic ... -
ThreatRiskEvaluator: A Tool for Assessing Threat-Specific Security Risks in the Cloud
( Institute of Electrical and Electronics Engineers Inc. , 2019 , Conference Paper)In cloud computing, security risks posed to individual clients are different based on their specific security requirements. In current practice, cloud providers usually apply generic protection mechanisms that may not be ... -
Time Series Forecasting Using Online Performance-based Ensemble Deep Random Vector Functional Link Neural Network
( Institute of Electrical and Electronics Engineers Inc. , 2022 , Conference Paper)Time series forecasting remains a challenging task in data science while it is of great relevance to decision-making in various industries such as transportation, finance, electricity resource management, meteorology. ... -
Using block cipher for confidentiality of images in cloud-based systems
( Institute of Electrical and Electronics Engineers Inc. , 2016 , Conference Paper)This paper deals with outsourcing of computing to cloud servers where clients' images are computed and stored. It proposes a technique that obfuscates images before sending them to servers. Cloud servers can perform ...