Attribute-based multiparty searchable encryption model for privacy protection of text data

S Yin, H Li, L Teng, AA Laghari, VV Estrela - Multimedia Tools and …, 2024 - Springer
The problems of data storage and sharing have been well solved with cloud storage.
However, the disadvantage is that users' messages are stored in the cloud without …

Prediction of network traffic in wireless mesh networks using hybrid deep learning model

S Mahajan, R HariKrishnan, K Kotecha - IEEE Access, 2022 - ieeexplore.ieee.org
Wireless mesh networks are getting adopted in the domain of network communication. Their
main benefits include adaptability, configuration, and flexibility, with added efficiency in cost …

Efficient public key encryption with outsourced equality test for cloud-based IoT environments

S Ma, Y Zhong, Q Huang - IEEE Transactions on Information …, 2022 - ieeexplore.ieee.org
Cloud-based Internet of Things (IoT) system is becoming a promising architecture in our
modern society. However, cloud-based IoT system brings a number of challenges in the …

Detecting noncooperation nodes mechanisms in wireless networks: a survey

S Nobahary, H Gharaee Garakani… - Security and …, 2022 - Wiley Online Library
Wireless networks face security problems compared with traditional wired networks. In
wireless networks such as wireless sensor networks (WSNs), mobile ad hoc networks …

Intelligent medical data analytics using classifiers and clusters in machine learning

V Muthukumaran, RB Joseph, AK Uday - Handbook of Research on …, 2021 - igi-global.com
A privacy-preserving patient-centric clinical decision support system, called PPCD, is based
on naive Bayesian classification to help the physician predict disease risks of patients in a …

A hybrid lightweight blockchain based encryption scheme for security enhancement in cloud computing

P Shrivastava, B Alam, M Alam - Multimedia Tools and Applications, 2024 - Springer
Cloud services provide an optimal form of demand based data outsourcing. The large
amount of user data sharing increases the possibility of attacks, and unauthorized users get …

Fine tuning smart manufacturing enterprise systems: a perspective of internet of things-based service-oriented architecture

SM Nagarajan, V Muthukumaran, IS Beschi… - … of Research on …, 2021 - igi-global.com
The workflow between business and manufacturing system level is changing leading to
delay in exploring the context of innovative ideas and solutions. Smart manufacturing …

Ransomware detection, prevention and protection in IoT devices using ML techniques based on dynamic analysis approach

P Sharma, S Kapoor, R Sharma - International Journal of System …, 2023 - Springer
Ransomware has become one of the most influential and most potent cybersecurity threats,
which, is expected to damage 20 Billion USD by 2021. The primary issue in dealing with …

Security threats to voice services in 5G standalone networks

Z Cui, B Cui, J Fu, R Dong - Security and Communication …, 2022 - Wiley Online Library
With the rapid development of 5G SA (standalone) networks, increasing subscribers are
motivated to make calls through 5G. To support voice services critical to mobile users, 5G SA …

Efficient Authenticated Key Agreement Protocol for Cloud-Based Internet of Things

V Muthukumaran, V Vinoth Kumar, RB Joseph… - … : Proceedings of ICICC …, 2022 - Springer
The key agreement with an authenticated key protocol is a cryptographic primitive that, in
theory, combines the operations of digital signature and public-key encryption in one step …