A novel secure aggregation scheme for wireless sensor networks using stateful public key cryptography

ORM Boudia, SM Senouci, M Feham - Ad Hoc Networks, 2015 - Elsevier
Wireless sensor networks (WSNs) are nowadays considered as an important part of the
Internet of Things (IoT). In these networks, data aggregation plays an essential role in …

[PDF][PDF] Blockchain Merkle-Tree Ethereum Approach in Enterprise Multitenant Cloud Environment.

P Dhiman, SK Henge, S Singh, A Kaur… - … Materials & Continua, 2023 - cdn.techscience.cn
This research paper puts emphasis on using cloud computing with Blockchain (BC) to
improve the security and privacy in a cloud. The security of data is not guaranteed as there is …

Secure and efficient verification for data aggregation in wireless sensor networks

OR Merad Boudia, SM Senouci… - International Journal of …, 2018 - Wiley Online Library
Summary The Internet of Things (IoT) concept is, and will be, one of the most interesting
topics in the field of Information and Communications Technology. Covering a wide range of …

Cloud key management based on verifiable secret sharing

M Hedabou - Network and System Security: 15th International …, 2021 - Springer
Managing encryption keys in cloud computing is a very challenging task, especially where
the model is shared and entirely controlled by the cloud providers. Hardware Security …

Improving e-payment security using elliptic curve cryptosystem

OR Vincent, O Folorunso, AD Akinde - Electronic Commerce Research, 2010 - Springer
The use of e-commerce has been associated with a lot of skepticism and apprehension due
to some crimes associated with e-commerce and specifically to payment systems. The …

Multi-objective optimization design of steel structure building energy consumption simulation based on genetic algorithm

Y Ren, S Rubaiee, A Ahmed, AM Othman… - Nonlinear …, 2022 - degruyter.com
In order to solve the problems of data acquisition, quantitative analysis and model solving in
the field of construction schedule optimization, a construction schedule optimization system …

Big data intelligent collection and network failure analysis based on artificial intelligence

J Ding, R Alroobaea, AM Baqasah, A Althobaiti… - Informatica, 2022 - informatica.si
In order to explore the intelligent collection of big data and network fault analysis, this paper
proposes a big data intelligent collection and network fault analysis based on artificial …

Study on library management system based on data mining and clustering algorithm

J Wang, R Alroobaea, AM Baqasah, A Althobaiti… - Informatica, 2023 - informatica.si
In order to improve the information retrieval and resource sharing abilities of the library and
establish an intelligent library information management system, alibrary management …

Implementation of network information security monitoring system based on adaptive deep detection

J Niu, R Alroobaea, AM Baqasah… - Journal of Intelligent …, 2022 - degruyter.com
For a better detection in Network information security monitoring system, the author
proposes a method based on adaptive depth detection. A deep belief network (DBN) was …

Research on data mining method of network security situation awareness based on cloud computing

Y Zhou, G Zhao, R Alroobaea, AM Baqasah… - Journal of Intelligent …, 2022 - degruyter.com
Due to the complexity and versatility of network security alarm data, a cloud-based network
security data extraction method is proposed to address the inability to effectively understand …