Articles with "secure efficient" as a keyword



Photo by scottwebb from unsplash

Secure and efficient online data storage and sharing over cloud environment using probabilistic with homomorphic encryption

Sign Up to like & get
recommendations!
Published in 2017 at "Cluster Computing"

DOI: 10.1007/s10586-017-0809-4

Abstract: Cloud computing is one of the great tasks in the business world nowadays, which provides shared processing resources. In cloud area network, security is the main challenge faced by cloud providers and their customers. The… read more here.

Keywords: efficient online; probabilistic homomorphic; security; encryption ... See more keywords
Photo from wikipedia

Secure and Efficient Product Information Retrieval in Cloud Computing

Sign Up to like & get
recommendations!
Published in 2018 at "IEEE Access"

DOI: 10.1109/access.2018.2816919

Abstract: Cloud computing is a promising information technique (IT) that can organize a large amount of IT resources in an efficient and flexible manner. Increasingly numerous companies plan to move their local data management systems to… read more here.

Keywords: information; cloud computing; cloud; secure efficient ... See more keywords
Photo from wikipedia

Cancelable Permutation-Based Indexing for Secure and Efficient Biometric Identification

Sign Up to like & get
recommendations!
Published in 2019 at "IEEE Access"

DOI: 10.1109/access.2019.2908456

Abstract: Cancelable biometric schemes have been widely studied to protect templates in biometric authentication over networks. These schemes transform biometric features and perform pattern matching without restoring the original features. Although they strongly prevent the leakage… read more here.

Keywords: secure efficient; biometric identification; indexing scheme; permutation based ... See more keywords
Photo from wikipedia

A Secure and Efficient Access and Handover Authentication Protocol for Internet of Things in Space Information Networks

Sign Up to like & get
recommendations!
Published in 2019 at "IEEE Internet of Things Journal"

DOI: 10.1109/jiot.2019.2902907

Abstract: Space information network (SIN) makes it possible for any object to be connected to the Internet anywhere, even in the areas with extreme conditions, where a cellular network is not easy to deploy. Access authentication… read more here.

Keywords: secure efficient; handover; access; sin ... See more keywords
Photo from wikipedia

Secure and Efficient ${K}$ Nearest Neighbor Query Over Encrypted Uncertain Data in Cloud-IoT Ecosystem

Sign Up to like & get
recommendations!
Published in 2019 at "IEEE Internet of Things Journal"

DOI: 10.1109/jiot.2019.2932775

Abstract: Uncertain data pervades many fields, including environmental monitoring, the monitoring of animal migrations, and urban warfare. Such uncertain data collected by field devices, such as Internet of Things (IoT) and Internet of Battlefield Things (IoBT)… read more here.

Keywords: secure efficient; cloud; query; uncertain data ... See more keywords
Photo by sotti from unsplash

Secure and Efficient Data Collection and Storage of IoT in Smart Ocean

Sign Up to like & get
recommendations!
Published in 2020 at "IEEE Internet of Things Journal"

DOI: 10.1109/jiot.2020.2988733

Abstract: Due to the abundant marine resources, smart ocean has attracted much attention of the government, industry, and academy. The Internet-of-Things (IoT) architectures for smart ocean have been proposed to collect various of data from the… read more here.

Keywords: iot smart; smart ocean; secure efficient; data collection ... See more keywords
Photo from wikipedia

Secure and Efficient Data Privacy-preserving Scheme for Mobile Cyber Physical Systems

Sign Up to like & get
recommendations!
Published in 2021 at "IEEE Internet of Things Journal"

DOI: 10.1109/jiot.2021.3081456

Abstract: Research on Mobile Cyber Physical Systems (MCPS) that have the superiorities of Cyber Physical Systems (CPS) and expand their application range has become a trend in recent years. The applications of MCPS in fields such… read more here.

Keywords: physical systems; secure efficient; cyber physical; mobile cyber ... See more keywords
Photo by campaign_creators from unsplash

A Provably Secure and Efficient Range Query Scheme for Outsourced Encrypted Uncertain Data From Cloud-Based Internet of Things Systems

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Internet of Things Journal"

DOI: 10.1109/jiot.2021.3088296

Abstract: The outsourcing of data is becoming increasingly commonplace as data is constantly been synchronized between user systems (e.g., personal computers and sensor devices) and cloud computing servers. However, to ensure data privacy, it is necessary… read more here.

Keywords: efficient range; secure efficient; uncertain data; scheme ... See more keywords
Photo by campaign_creators from unsplash

Secure and Efficient Data Deduplication in JointCloud Storage

Sign Up to like & get
recommendations!
Published in 2023 at "IEEE Transactions on Cloud Computing"

DOI: 10.1109/tcc.2021.3081702

Abstract: Data deduplication can efficiently eliminate data redundancies in cloud storage and reduce the bandwidth requirement of users. However, most previous schemes depending on the help of a trusted key server (KS) are vulnerable and limited… read more here.

Keywords: efficient data; jointcloud storage; data deduplication; secure efficient ... See more keywords
Photo by hajjidirir from unsplash

SEAR: Secure and Efficient Aggregation for Byzantine-Robust Federated Learning

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Transactions on Dependable and Secure Computing"

DOI: 10.1109/tdsc.2021.3093711

Abstract: Federated learning facilitates the collaborative training of a global model among distributed clients without sharing their training data. Secure aggregation, a new security primitive for federated learning, aims to preserve the confidentiality of both local… read more here.

Keywords: aggregation; federated learning; secure efficient; byzantine ... See more keywords
Photo by lensingmyworld from unsplash

Joint Biological ID : A Secure and Efficient Lightweight Biometric Authentication Scheme

Sign Up to like & get
recommendations!
Published in 2023 at "IEEE Transactions on Dependable and Secure Computing"

DOI: 10.1109/tdsc.2022.3186999

Abstract: Biometric applications makes biometric authentication replace the traditional password in many cases. Biometric recognition technology has the advantages of convenience and high stability, facilitating identity recognition. However, the shortcoming of biometric authentication is easy to… read more here.

Keywords: authentication; authentication scheme; biometric authentication; secure efficient ... See more keywords