A privacy-preserving mutual authentication scheme for group communication in VANET

HJ Nath, H Choudhury - Computer Communications, 2022 - Elsevier
Abstract A Vehicular Ad-Hoc Network (VANET) represents a collection of vehicles that
communicate among themselves and the road infrastructure for exchange of information …

APD-JFAD: accurate prevention and detection of jelly fish attack in MANET

S Doss, A Nayyar, G Suseendran, S Tanwar… - Ieee …, 2018 - ieeexplore.ieee.org
Mobile ad hoc networks (MANETs) are surrounded by tons of different attacks, each with
different behavior and aftermaths. One of the serious attacks that affect the normal working of …

A decentralized blockchain-based key management protocol for heterogeneous and dynamic IoT devices

MA Kandi, DE Kouicem, M Doudou, H Lakhlef… - Computer …, 2022 - Elsevier
Secure communication is one of the main challenges that are slowing down the
development of the Internet of Things (IoT). Key Management (KM) is particularly a difficult …

A secure communication using multifactor authentication and key agreement techniques in internet of medical things for COVID‐19 patients

C Chunka, S Banerjee, SK Gupta - … and Computation: Practice …, 2023 - Wiley Online Library
Abstract Currently, Internet of Medical Things (IoMT) gained popularity because of an
ongoing pandemic. A few developed countries plan to deploy the IoMT for improving the …

Blockchain-based secure key management for mobile edge computing

J Li, J Wu, L Chen, J Li, SK Lam - IEEE Transactions on Mobile …, 2021 - ieeexplore.ieee.org
Mobile edge computing (MEC) is a promising edge technology to provide high bandwidth
and low latency shared services and resources to mobile users. However, the MEC …

[Retracted] Security Hardened and Privacy Preserved Android Malware Detection Using Fuzzy Hash of Reverse Engineered Source Code

H Ali, K Batool, M Yousaf, M Islam Satti… - Security and …, 2022 - Wiley Online Library
The risk of malware has increased drastically in recent years due to advances in the IT
industry but it also increased the need for malware analysis and prevention. Hackers inject …

Similarity aware safety multimedia data transmission mechanism for Internet of vehicles

D Wu, L Deng, H Wang, K Liu, R Wang - Future Generation Computer …, 2019 - Elsevier
Multimedia data is transmitted in Internet of Vehicles (IoVs) through wireless links, which is
vulnerable to privacy threats. To secure the multimedia data transmission in IoVs, a …

An optimization model for task scheduling in mobile cloud computing

R Alakbarov - International Journal of Cloud Applications and …, 2022 - igi-global.com
The rapid increase in the number of mobile users in mobile cloud computing (MCC), the
cloud servers' remoteness, and the Internet loading have caused significant delays in the …

[HTML][HTML] Mechanisms and techniques to enhance the security of big data analytic framework with mongodb and Linux containers

A Mailewa, S Mengel, L Gittner, H Khan - Array, 2022 - Elsevier
The frequency and scale of unauthorized access cases and misuses of data access
privileges are a growing concern of many organizations. The protection of confidential data …

Securing web documents by using piggybacked framework based on Newton's forward interpolation method

J Arora, KR Ramkumar, R Sathiyaraj… - Journal of Information …, 2023 - Elsevier
The modern telecommunication system that transfers data over the web requires a secure
channel so that integrity, authentication, and confidentiality of data are ensured. To achieve …