A survey on attribute-based encryption schemes suitable for the internet of things

M Rasori, M La Manna, P Perazzo… - IEEE Internet of Things …, 2022 - ieeexplore.ieee.org
The Internet of Things (IoT) is an information service paradigm based on the integration of
smart objects, mobile devices, and computers via the Internet. IoT technologies are key …

Insights into security and privacy towards fog computing evolution

S Sicari, A Rizzardi, A Coen-Porisini - Computers & Security, 2022 - Elsevier
The incremental diffusion of the Internet of Things (IoT) technologies and applications
represents the outcome of a world ever more connected by means of heterogeneous and …

Attribute-based encryption schemes for next generation wireless IoT networks: a comprehensive survey

Shruti, S Rani, DK Sah, G Gianini - Sensors, 2023 - mdpi.com
Most data nowadays are stored in the cloud; therefore, cloud computing and its extension—
fog computing—are the most in-demand services at the present time. Cloud and fog …

Performance evaluation of attribute-based encryption in automotive embedded platform for secure software over-the-air update

M La Manna, L Treccozzi, P Perazzo, S Saponara… - Sensors, 2021 - mdpi.com
This paper aims to show that it is possible to improve security for over the air update
functionalities in an automotive scenario through the use of a cryptographic scheme, called …

Performance evaluation of attribute-based encryption on constrained IoT devices

P Perazzo, F Righetti, M La Manna, C Vallati - Computer Communications, 2021 - Elsevier
Abstract The Internet of Things (IoT) is enabling a new generation of innovative services
based on the seamless integration of smart objects into information systems. This raises new …

Tamper-proof access control for IoT clouds using enclaves

GA Thomaz, MB Guerra, M Sammarco, M Detyniecki… - Ad Hoc Networks, 2023 - Elsevier
Abstract Internet of Things (IoT) devices rely on cloud computing for processing user-
sensitive data, like health recordings and geolocalization. In this case, security primitives like …

Deepfake Media Forensics: State of the Art and Challenges Ahead

I Amerini, M Barni, S Battiato, P Bestagini… - arXiv preprint arXiv …, 2024 - arxiv.org
AI-generated synthetic media, also called Deepfakes, have significantly influenced so many
domains, from entertainment to cybersecurity. Generative Adversarial Networks (GANs) and …

A dual auditing protocol for fine-grained access control in the edge-cloud-based smart home

XX Zhang, R Shi, WP Guo, PB Wang, WY Ke - Computer Networks, 2023 - Elsevier
Devices and edges of the Internet of Things (IoT) are working together to broaden the
sensing capability of the IoT. The protection of personal sensory information privacy in the …

Adaptive context-aware access control for IoT environments leveraging fog computing

R Kalaria, ASM Kayes, W Rahayu, E Pardede… - International Journal of …, 2024 - Springer
The increasing use of the Internet of Things (IoT) has driven the demand for enhanced and
robust access control methods to protect resources from unauthorized access. A cloud …

[HTML][HTML] How can the holder trust the verifier? A CP-ABPRE-based solution to control the access to claims in a self-sovereign-identity scenario

F Buccafurri, V De Angelis, R Nardone - Blockchain: Research and …, 2024 - Elsevier
Abstract The interest in Self-Sovereign Identity (SSI) in research, industry, and governments
is rapidly increasing. SSI is a paradigm where users hold their identity and credentials …