Zobrazeno 1 - 10
of 96
pro vyhledávání: '"Masahiro Mambo"'
Autor:
Naing Win Tun, Masahiro Mambo
Publikováno v:
Sensors, Vol 24, Iss 16, p 5295 (2024)
The Internet of Things faces significant security challenges, particularly in device authentication. Traditional methods of PUF-based authentication protocols do not fully address IoT’s unique security needs and resource constraints. Existing solut
Externí odkaz:
https://doaj.org/article/28c3014dd51c4a7c8b66527686fa244f
Publikováno v:
IET Information Security, Vol 2024 (2024)
The emergence of cloud computing enables users to upload data to remote clouds and compute them. This drastically reduces computing and storage costs for users. Considering secure computing for multilevel users in enterprises, the notion of hierarchi
Externí odkaz:
https://doaj.org/article/e4d3f3522566470c841a65c43f5d40cd
Autor:
Hari Purnama, Masahiro Mambo
Publikováno v:
Sensors, Vol 24, Iss 3, p 979 (2024)
Ensuring authorized access control in the IoT is vital for privacy and safety protection. Our study presents the novel IHIBE framework, which combines IOTA (a distributed ledger technology) with hierarchical identity-based encryption (HIBE), thereby
Externí odkaz:
https://doaj.org/article/03ab1a97337b4386bdd5d4a0cc7edd40
Publikováno v:
IEEE Access, Vol 11, Pp 62510-62521 (2023)
Fuzzy signatures (FS) are a kind of signature scheme that employs a noisy string (e.g., biometric data) as the secret key without requiring the user-specific auxiliary data. As the quantum computing era approaches, some research has been dedicated to
Externí odkaz:
https://doaj.org/article/4f9d8ed3ecd14bf98ef812fa0ce3d79d
Autor:
Hendra Kurniawan, Masahiro Mambo
Publikováno v:
IEEE Access, Vol 11, Pp 34718-34735 (2023)
Due to the widespread use of distributed data mining techniques in a variety of areas, the issue of protecting the privacy of sensitive data has received increasing attention in recent years. Privacy-preserving distributed data mining (PPDDM) focuses
Externí odkaz:
https://doaj.org/article/12464a3670ba420fbd3fdbca3655c8a1
Publikováno v:
IET Information Security, Vol 16, Iss 2, Pp 111-126 (2022)
Abstract Identity‐based encryption (IBE), introduced by Shamir, eliminates the need for public‐key infrastructure. The sender can simply encrypt a message by using the recipient's identity (such as email or IP address) without needing to look up
Externí odkaz:
https://doaj.org/article/49368aa61f5642158db101d2d487d6da
Autor:
Danu Dwi Sanjoyo, Masahiro Mambo
Publikováno v:
IEEE Access, Vol 10, Pp 134086-134112 (2022)
Internet Engineering Task Force (IETF) issued Secure Zero Touch Provisioning (SZTP) as a provisioning technique for networking devices without human intervention. SZTP standardizes the provisioning workflow from device enrollment to bootstrapping pro
Externí odkaz:
https://doaj.org/article/4531822c7c1c46aca9cf0bf8c246efd9
Autor:
Hendra Kurniawan, Masahiro Mambo
Publikováno v:
Entropy, Vol 24, Iss 11, p 1545 (2022)
Active learning is a technique for maximizing performance of machine learning with minimal labeling effort and letting the machine automatically and adaptively select the most informative data for labeling. Since the labels on records may contain sen
Externí odkaz:
https://doaj.org/article/6f1d70946fcf41bdaf388b742235681c
Autor:
Jan Wantoro, Masahiro Mambo
Publikováno v:
Journal of Sensor and Actuator Networks, Vol 11, Iss 3, p 51 (2022)
Vehicle to everything (V2X) technology allows the broader development of driving safety, efficiency, and comfort. Because the vehicles can quickly send and receive frequent messages from other vehicles and nearby devices, e.g., cooperative awareness
Externí odkaz:
https://doaj.org/article/26d525a4f92b44f8800851340e612938
Autor:
Favian Dewanta, Masahiro Mambo
Publikováno v:
IEEE Access, Vol 7, Pp 103095-103114 (2019)
Handover schemes play a vital role on fog computing service (FCS) provided through vehicular network. It not only determines the quality of services (QoSs) but also the security and safety of vehicular network system against adversaries. As a part of
Externí odkaz:
https://doaj.org/article/7a91afe961eb4407831b2b094792fce8