Zobrazeno 1 - 10
of 64
pro vyhledávání: '"Wei Chuen Yau"'
Publikováno v:
Scientific Reports, Vol 12, Iss 1, Pp 1-13 (2022)
Abstract Lightweight cryptography has recently gained importance as the number of Internet of things (IoT) devices connected to Internet grows. Its main goal is to provide cryptographic algorithms that can be run efficiently in resource-limited envir
Externí odkaz:
https://doaj.org/article/323bd88f7ce346038ce1dab89e0aeac1
Publikováno v:
IEEE Access, Vol 10, Pp 21584-21598 (2022)
The public key encryption with keyword search (PEKS) scheme allows searches to be performed over ciphertext by a server in a public-key setting. The PEKS scheme suffers from a major drawback which is keyword guessing attack. A keyword guessing attack
Externí odkaz:
https://doaj.org/article/9231c00589c84c9cb0fcb364c8b16ee7
Publikováno v:
IEEE Access, Vol 9, Pp 8479-8490 (2021)
The features of decentralization and tamper-proof enable blockchain to be an emerging technology for integrity protection of important data stored on it. Blockchains are also used to combine with cloud storage for access control and sharing of privat
Externí odkaz:
https://doaj.org/article/85f9b5a43e2444ae9dd958e4db7b35af
Publikováno v:
IEEE Access, Vol 9, Pp 62118-62136 (2021)
In the telco industry, attracting new customers is no longer a good strategy since the cost of retaining existing customers is much lower. Churn management becomes instrumental in the telco industry. As there is limited study combining churn predicti
Externí odkaz:
https://doaj.org/article/9fca827183f744039243071a99f1719b
Publikováno v:
IEEE Access, Vol 9, Pp 72568-72586 (2021)
Grain-128AEAD is a lightweight authenticated encryption stream cipher and one of the finalists in the National Institute of Standards and Technology (NIST) Lightweight Cryptography (LWC) project. This paper provides an independent third-party analysi
Externí odkaz:
https://doaj.org/article/30e6f612281343b784b01b1b1261a7d6
Publikováno v:
IEEE Access, Vol 9, Pp 100352-100368 (2021)
Age is an important human attribute that needs to be determined for various purposes, including security, health, human identification, and law enforcement. Hence, there is an increasing research interest in automatic age estimation using biometric t
Externí odkaz:
https://doaj.org/article/90796dec575a492d8323f19552934ea1
A Decryptable Attribute-Based Keyword Search Scheme on eHealth Cloud in Internet of Things Platforms
Publikováno v:
IEEE Access, Vol 8, Pp 26107-26118 (2020)
Recently, attribute-based keyword search (ABKS) schemes have been used to provide fine-grained search over encrypted data on eHealth cloud in the Internet of Things (IoT) platforms. As compared to conventional public key encryption with keyword searc
Externí odkaz:
https://doaj.org/article/e816d666788849699fc26e22eb62d0e5
Publikováno v:
IEEE Transactions on Cloud Computing. 11:499-514
Policy-based chameleon hash (PCH) is one of the techniques used for rewriting transaction-level data stored in blockchains. This technique integrates the access policy of the attribute-based encryption (ABE) in the transactions and only allows users
Publikováno v:
ETRI Journal, Vol 41, Iss 5, Pp 557-559 (2019)
We are facing a big data world, embedded with interconnected IoT (Internet of Things) devices that generate large volumes of data. They pose a significant challenge to academia and industries focused on digital security: A variety of new malware and
Externí odkaz:
https://doaj.org/article/be5228f67c1c4d518fafdaf8a6d20d2c
Publikováno v:
Symmetry, Vol 13, Iss 8, p 1535 (2021)
Public key infrastructure (PKI) plays a fundamental role in securing the infrastructure of the Internet through the certification of public keys used in asymmetric encryption. It is an industry standard used by both public and private entities that c
Externí odkaz:
https://doaj.org/article/70993770d4154168a9a2f81d85f3d956