A caching and spatial K-anonymity driven privacy enhancement scheme in continuous location-based services

S Zhang, X Li, Z Tan, T Peng, G Wang - Future Generation Computer …, 2019 - Elsevier
… effectiveness and efficiency of our proposed CSKA scheme. … In this study, we use the Markov
model to predict the user’s … almost no users’ queries and are likely to have swamps, rugged

[HTML][HTML] A secure pseudonym-based conditional privacy-preservation authentication scheme in vehicular ad hoc networks

MA Al-Shareeda, M Anbar, S Manickam, IH Hasbullah - Sensors, 2022 - mdpi.com
Achieving rapid message signing and verification for … Several scholars have proposed
to address the security, privacy, and performance efficiency for the VANET system. However, …

[HTML][HTML] A robust and lightweight secure access scheme for cloud based E-healthcare services

M Masud, GS Gaba, K Choudhary, R Alroobaea… - Peer-to-peer Networking …, 2021 - Springer
… is the best fit for protecting data security and privacy in cloud-… identity-based encryption and
an equality test helps achieve a … to enhance the scheme a cost-effective solution for LPWAN. …

Lightweight mutual authentication and privacy-preservation scheme for intelligent wearable devices in industrial-CPS

MA Jan, F Khan, R Khan, S Mastorakis… - IEEE transactions on …, 2020 - ieeexplore.ieee.org
… we propose a lightweight mutual authentication scheme. Our … using an AI-enabled hidden
Markov model. We analyzed the … approach to achieve system efficiency and robustness, and at …

A secured and efficient communication scheme for decentralized cognitive radio-based Internet of vehicles

W Yao, A Yahya, F Khan, Z Tan, AU Rehman… - IEEE …, 2019 - ieeexplore.ieee.org
… in terms of security and privacy due to the dynamic nature of … , using a hidden Markov model
(HMM), the proposed scheme … have used a lightweight authentication scheme, where the …

User authentication on mobile devices: Approaches, threats and trends

C Wang, Y Wang, Y Chen, H Liu, J Liu - Computer Networks, 2020 - Elsevier
… pass the authentication system using the user’s identity … The n-gram Markov model estimates
the probability of the next … and develop the iris-based authentication system effective in both …

Intelligent detection system enabled attack probability using Markov chain in aerial networks

IU Khan, A Abdollahi, R Alturki… - Wireless …, 2021 - Wiley Online Library
… is a tough task to tackle. The aim of this paper is to explore the IDS … mechanism for security
and privacy to secure U2U communication … , metric value can be effective in terms of outcome. …

Blockchain-based trust management model for location privacy preserving in VANET

B Li, R Liang, D Zhu, W Chen… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
… that the proposed system is effective and feasible in collect. … Experiments indicate that our
scheme has strong resistance … The former sends anonymous query requests to RSU to obtain

A user‐defined location‐sharing scheme with efficiency and privacy in mobile social networks

T Peng, J Liu, G Wang, Q Liu, J Chen… - Scientific …, 2020 - Wiley Online Library
… the dishonest mobile users try to obtain other users’ information … (CSKA) and utilized the
Markov model to predict the next … methods can provide strong privacy guarantee for users at the …

Secure authentication and group key distribution scheme for WBANs based on smartphone ECG sensor

H Tan, I Chung - IEEE Access, 2019 - ieeexplore.ieee.org
… In this case, effective authentication scheme with efficient … a secure certificateless biometric
authentication scheme for WBANs … Note that the simplified Markov model is applied for ECG …