A survey on attribute-based signatures

PSK Oberko, VHKS Obeng, H Xiong… - Journal of Systems …, 2022 - Elsevier
Abstract Attribute-Based Signature (ABS), where messages are signed concerning a signing
strategy conveyed as predicates, provides a necessary platform for implementing fine …

Intelligent IoT-BOTNET attack detection model with optimized hybrid classification model

B Bojarajulu, S Tanwar, TP Singh - Computers & Security, 2023 - Elsevier
The botnet have developed into a severe risk to Internet of Things (IoT) systems as a result
of manufacturers 'insufficient security policies and end users' lack of security awareness. By …

[PDF][PDF] Modified Bat Algorithm for Optimal VM's in Cloud Computing.

A Sundas, S Badotra, Y Alotaibi… - … Materials & Continua, 2022 - cdn.techscience.cn
All task scheduling applications need to ensure that resources are optimally used,
performance is enhanced, and costs are minimized. The purpose of this paper is to discuss …

Improved Multisignature Scheme for Authenticity of Digital Document in Digital Forensics Using Edward‐Curve Digital Signature Algorithm

G Shankar, LH Ai-Farhani… - Security and …, 2023 - Wiley Online Library
At the moment, digital documents are just as important as paper documents. As a result,
authenticity is essential, especially in legal situations and digital forensics. As technology …

A comparative study on blockchain-based distributed public key infrastructure for IoT applications

M Gupta, S Tanwar, TK Bhatia, S Badotra… - Multimedia Tools and …, 2024 - Springer
Abstract Internet of Things (IoT) has gained wide popularity due to its implementation in
smart homes and wearables. IoT centralized system increases the risk of a single point of …

Security and Privacy of Wearable Wireless Sensors in Healthcare: A Systematic Review

R Kaur, S Shahrestani, C Ruan - Computer Networks and …, 2024 - ojs.wiserpub.com
Abstract Wearable Wireless Sensor Network (WWSN) devices are widely used in healthcare
to monitor health data. However, when WWSN users transmit their data to healthcare …

Performance analysis of ODL and RYU controllers' against DDoS attack in software defined networks

N Gupta, S Tanwar, S Badotra - Cluster Computing, 2024 - Springer
Software-defined networking (SDN) is a new way of designing and managing networks. The
central SDN controller serves as the network's brain in the control plane. This paper …

Recurring Threats to Smart Healthcare Systems Based on Machine Learning

A Sundas, S Badotra - 2022 10th International Conference on …, 2022 - ieeexplore.ieee.org
Accurate analysis of illness diagnosis, progression, and real-time monitoring, made possible
by the ever-increasing availability of healthcare data, is essential for providing better …

A self-error-correction-based reversible watermarking scheme for vector maps

Y Qiu, J Sun, J Zheng - ISPRS International Journal of Geo-Information, 2023 - mdpi.com
The existing digital watermarking schemes for vector maps focus mainly on the process of
watermark embedding, while few works have been conducted on the topic of the self …

[PDF][PDF] Revolutionizing Healthcare by Unleashing the Power of Machine Learning in Diagnosis and Treatment.

M Gupta, S Tanwar, S Bharany, F Binzagr… - … Journal of Advanced …, 2024 - researchgate.net
Machine learning (ML) is a versatile technology that has the potential to revolutionize
various industries. ML can predict future trends in customer expectations that allow …