Ausgabe 2/2024
Inhalt (28 Artikel)
A blockchain-based ubiquitous entity authentication and management scheme with homomorphic encryption for FANET
Hui Xie, Jun Zheng, Teng He, Shengjun Wei, Changzhen Hu
SAKMR: Industrial control anomaly detection based on semi-supervised hybrid deep learning
Shijie Tang, Yong Ding, Meng Zhao, Huiyong Wang
Secret sharing based RFID protocol using ECC for TMIS
Haradhan Ghosh, Pramod Kumar Maurya, Satya Bagchi
CIM: CP-ABE-based identity management framework for collaborative edge storage
Chunjiao Li, Liangmin Wang, Jiayi Li, Yue Fei
Flexible symmetric predicate encryption for data privacy in IoT environments
Qingquan Bian, Yue Zhang, Chang Song, Axin Wu
PGASH: Provable group-based authentication scheme for Internet of Healthcare Things
Chandan Trivedi, Keyur Parmar, Udai Pratap Rao
A pairing-free certificate-based key-insulated aggregate signature scheme for wireless medical sensor networks
Min Liu, Liangliang Wang, Kai Zhang, Yu Long, Baodong Qin
SEE2PK: Secure and energy efficient protocol based on pairwise key for hierarchical wireless sensor network
Anurag Shukla, Sarsij Tripathi, Mohit Sajwan, Deepak Singh
Hybrid optimized task scheduling with multi-objective framework for crowd sensing in mobile social networks
Sasireka V, Shyamala Ramachandran
A bibliometric analysis of blockchain development in industrial digital transformation using CiteSpace
Xin Su, Shengwen Wang, Renzhu Yu
A low-cost blockchain node deployment algorithm for the internet of things
Xinyu Lai, Youchi Zhang, Haoxiang Luo
A Blockchain-based Privacy Protection Protocol using Smart Contracts in LEO satellite networks
Xia Deng, Junbin Shao, Le Chang, Junbin Liang
Grouped federated learning for time-sensitive tasks in industrial IoTs
Jiangshan Hao, Linghao Zhang, Yanchao Zhao
Extended chaotic map-based key management for hierarchical access control in e-medicine systems
Tian-Fu Lee, I-Pin Chang, Jyun-Guo Wang, Yen-Chang Chen, Sheng-Tzung Tsai, Rui-Yu Chen
Towards driver distraction detection: a privacy-preserving federated learning approach
Wenguang Zhou, Zhiwei Jia, Chao Feng, Huali Lu, Feng Lyu, Ling Li
A multi-objective privacy preservation model for cloud security using hunter prey optimization algorithm
Sahaya Stalin Jose G, Sugitha G, Ayshwarya Lakshmi S, Preethi B. C
MMCNN-ZO: Modified multi-scale convolutional neural network-based zebra optimization for enhancing data encryption system
Anuradha M, Jean Justus J, Mary Immaculate Sheela L
A website fingerprinting technology with time-sampling
Xueshu Hong, Shaoyong Li, Xingkong Ma, Bo Liu, Fan Wu
Design and implementation of anchor coprocessor architecture for wireless node localization applications
Rathindra Nath Biswas, Anurup Saha, Swarup Kumar Mitra, Mrinal Kanti Naskar
A trustworthy and reliable multi-keyword search in blockchain-assisted cloud-edge storage
Xingchen Liu, Shaohui Zhang, Haiping Huang, Reza Malekian
Socially-aware and privacy-preserving multi-objective worker recruitment in mobile crowd sensing
Yanming Fu, Shenglin Lu, Jiayuan Chen, Xiao Liu, Bocheng Huang
Retraction Note: Issues of crowdsourcing and mobile app development through the intellectual property protection of third parties
- Retraction Note
Zhijiang Liu, Viktor Shestak