Privacy-preservation techniques for IoT devices: a systematic mapping study

D Torre, A Chennamaneni, A Rodriguez - IEEE Access, 2023 - ieeexplore.ieee.org
The Internet of Things (IoT) is becoming a pervasive technology entangled in everyday life.
The objective of IoT is to provide ubiquitous access to numerous devices and machines on …

An improved chaotic image encryption algorithm using Hadoop-based MapReduce framework for massive remote sensed images in parallel IoT applications

MA Al-Khasawneh, I Uddin, SAA Shah… - Cluster …, 2022 - Springer
Image encryption algorithms based on Chaotic approach are becoming increasingly popular
for remotely sensed images using parallel techniques. It has been demonstrated that the …

Deepknuckle: Deep learning for finger knuckle print recognition

AS Tarawneh, AB Hassanat, E Alkafaween, B Sarayrah… - Electronics, 2022 - mdpi.com
Biometric technology has received a lot of attention in recent years. One of the most
prevalent biometric traits is the finger-knuckle print (FKP). Because the dorsal region of the …

A Review on IoTs Applications and Security Threats via Data Transfer over Networks

BM Radhi, MA Hussain, ZA Abduljabbar… - Computer Science On …, 2024 - Springer
The concept of the “Internet of Things,” which states that everything is connected to
everything else and that everything interacts with everything else, is a fascinating …

Comprehensive Challenges to E-government in Iraq

HK Abdali, MA Hussain, ZA Abduljabbar… - Computer Science On …, 2024 - Springer
In recent years, governments and commercial organizations all over the world have
endeavored to explore new searches, opportunities, and investments for making their …

Fast Multi-User Searchable Encryption with Forward and Backward Private Access Control

SS Bulbul, ZA Abduljabbar, DF Najem… - Journal of Sensor and …, 2024 - mdpi.com
Untrusted servers are servers or storage entities lacking complete trust from the data owner
or users. This characterization implies that the server hosting encrypted data may not enjoy …

A Privacy-preserving Large-scale Image Retrieval Framework with Vision GNN Hashing

Y Cao, F Meng, X Shang, J Gui… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
With the growing popularity of cloud services, companies and individuals outsource images
to cloud servers to reduce storage and computing burdens. The images are encrypted …

Privacy-preserving content-based image retrieval in edge environment

Y Yan, Y Xu, Y Zhang, Z Wang, Z Rao - Cluster Computing, 2022 - Springer
Traditional centralized cloud services face challenges, such as high communication delay,
single point of failure, etc. Edge computing is one of distributed computing services in which …

Privacy-preserving image retrieval based on additive secret sharing in cloud environment

B Zhang, Y Xu, Y Yan, Z Wang - Cluster Computing, 2024 - Springer
With the development of cloud computing, more and more resource constrained data
owners tend to store their images in the cloud and rely on image retrieval services to get …

Asymmetric commutative encryption scheme based efficient solution to the millionaires' problem

M Liu, P Nanda, X Zhang, C Yang… - 2018 17th IEEE …, 2018 - ieeexplore.ieee.org
Secure multiparty computation (SMC) is an important scheme in cryptography and can be
applied in various real-life problems. The first SMC problem is the millionaires' problem …