Browse Items (14 total)

  • Tags: Cryptography

as data size is growing up, cloud storage is becoming more familiar to store a significant amount of private information. Government and private organizations require transferring plenty of business files from one end to another. However, we will…

WSNs are multihop networks, which depend on the intermediate nodes to relay the data packet to the destination. These nodes are equipped with lesser memory, limited battery power, little computation capability, small range of communication and need a…

The integration of new Information and Communication Technologies (ICT) within the heart of Industrial Control Systems (ICS) generated a large palette of innovative solutions. As such, the industry has undergone a new technological revolution, also…

Public verification enables cloud users to employ a third party auditor (TPA) to check the data integrity. However, recent breakthrough results on quantum computers indicate that applying quantum computers in clouds would be realized. A majority of…

Named Data Networking (NDN) is a new clean-slate architecture for the future Internet. Efficient content retrieval is the original intention of NDN design. The content retrieval process driven by content consumers in NDN includes the following…

Outsourced storage enables data owners to host their data on remote storage resources without keeping a local copy so as to target their core business. However, a serious problem is data integrity in the sense that data owners lose their physical…

The fifth-generation (5G) wireless network is commercialized. The need to integrate massive devices in 5G and wireless sensor networks (WSN) to provide several convenient services for network users becomes imperative. However, there are growing…

Lightweight Cryptography (LWC) based Authenticated Encryption with Associative Data (AEAD) cryptographic primitives require fewer computational and energy resources than conventional cryptographic primitives as a single operation of an AEAD scheme…

The proliferation and extensive acceptance of biometrics in many sectors is due to its merits over traditional password-based authentication. Several biometric template protection schemes have been proposed during the last decade to address the…

Biometric authentication, the process of verification using unique biological characteristics, is considered one of the most accurate technologies for authentication. It compares two or more biometric data to identify the differences among them…

Person re-identification (Re-ID) has attracted extensive attention due to its potential to identify a person of interest from different surveillance videos. With the increasing amount of the surveillance videos, high computation and storage costs…

In this article, we analyze the inherent characteristics of smart grids, and point out that some electricity consumption data are very sensitive and should be encrypted. However, once the corresponding private key is compromised, the content of…

Data integrity has become an extremely important security issue in cloud-assisted wireless body area networks (WBANs). As accurate medical diagnostic analysis is heavily based on outsourced electronic medical data in cloud storage, any corrupted data…

Public verification enables cloud users to employ a third party auditor (TPA) to check the data integrity. However, recent breakthrough results on quantum computers indicate that applying quantum computers in clouds would be realized. A majority of…
Output Formats

atom, dcmes-xml, json, omeka-xml, rss2