A security optimization scheme for data security transmission in UAV-assisted edge networks based on federal learning

H Zhang, J Xue, Q Wang, Y Li - Ad Hoc Networks, 2023 - Elsevier
To solve the problem that mobile users cannot handle all data tasks by themselves due to
the huge amount of data at present, this paper proposes a four-layer model of efficient and …

Network Applications Observability on Hosts: A New SDN Privacy Issue

I Serrat, T Kenaza, I Debicha - 2023 International Conference …, 2023 - ieeexplore.ieee.org
Software Defined Networking is a relatively new network paradigm that enables unified
programmable network control. SDN is still subject to several challenges, such as scalability …

[PDF][PDF] CLOUD BASED PRIVACY PRESERVING DATA MINING MODEL USING HYBRID K-ANONYMITY AND PARTIAL HOMOMORPHIC ENCRYPTION

HOM OSMAN - 2022 - eprints.utm.my
The evolution of information and communication technologies have encourage numerous
organizations to outsource their business and data to cloud computing to perform data …

Inter-domain Routing Scheme based on Secure Multi-Party Computation over SDN Architecture

X Ni, H Zhao - 2020 International Conference on Internet of …, 2020 - ieeexplore.ieee.org
The Internet including enterprise-level networks, data center networks, and wide area
networks can be divided into many autonomous domains. Autonomous domains can be …

[引用][C] Enhanced Cryptography Techniques Using Inherited Process with Cyclic Crossover Operation in Big Data

A Joseph, P Mathew, M Cherian - International Journal of Modeling …, 2024 - World Scientific
Big Data is a massive collection of data that require secure information transmission in the
network. Hence various existing Cryptography techniques have been used to improve …