[HTML][HTML] Security, privacy and risks within smart cities: Literature review and development of a smart city interaction framework

E Ismagilova, L Hughes, NP Rana… - Information Systems …, 2022 - Springer
The complex and interdependent nature of smart cities raises significant political, technical,
and socioeconomic challenges for designers, integrators and organisations involved in …

Fog computing in enabling 5G-driven emerging technologies for development of sustainable smart city infrastructures

S Jain, S Gupta, KK Sreelakshmi, JJPC Rodrigues - Cluster Computing, 2022 - Springer
The usage of 5G-enabled IoT devices is rising exponentially as humans tend to shift towards
a more automated lifestyle. A significant amount of IoT devices is expected to join the …

IFaaSBus: A security-and privacy-based lightweight framework for serverless computing using IoT and machine learning

M Golec, R Ozturac, Z Pooranian… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
As data of COVID-19 patients is increasing, the new framework is required to secure the
data collected from various Internet of Things (IoT) devices and predict the trend of disease …

A contemporary survey on IoT based smart cities: architecture, applications, and open issues

S Ketu, PK Mishra - Wireless Personal Communications, 2022 - Springer
Abstract Internet of Things (IoT) is one of the emerging technologies, which is widely used
across the globe. As the idea of a smart city was founded, IoT has been acknowledged as …

Characterizing human aspects in reviews of covid-19 apps

M Fazzini, H Khalajzadeh, O Haggag, Z Li… - Proceedings of the 9th …, 2022 - dl.acm.org
To successfully satisfy user needs, software developers need to suitably capture and
implement user requirements. A critical and often overlooked characteristic of user …

Anonymous authentication scheme for smart cloud based healthcare applications

A Mehmood, I Natgunanathan, Y Xiang, H Poston… - IEEE …, 2018 - ieeexplore.ieee.org
Many smart healthcare applications are adopting cloud to provide services to patients.
However, the sensitive data can be disclosed to the authentication server/service provider …

Attribute-based pseudonymity for privacy-preserving authentication in cloud services

V Sucasas, G Mantas, M Papaioannou… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
Attribute-based authentication is considered a cornerstone component to achieve scalable
fine-grained access control in the fast growing market of cloud-based services …

The road towards plant phenotyping via WSNs: An overview

F Al-Turjman - Computers and Electronics in Agriculture, 2019 - Elsevier
The recent advances of wireless sensor networks have enabled the integration and
application of this technology in vital environmental applications. Among these …

Ensemble-based feature selection and classification model for DNS typo-squatting detection

A Moubayed, E Aqeeli, A Shami - 2020 IEEE Canadian …, 2020 - ieeexplore.ieee.org
Domain Name System (DNS) plays in important role in the current IP-based Internet
architecture. This is because it performs the domain name to IP resolution. However, the …

A signature scheme with unlinkable-yet-accountable pseudonymity for privacy-preserving crowdsensing

V Sucasas, G Mantas, J Bastos… - IEEE Transactions …, 2019 - ieeexplore.ieee.org
Crowdsensing requires scalable privacy-preserving authentication that allows users to send
anonymously sensing reports, while enabling eventual anonymity revocation in case of user …