Browse Items (17 total)

  • Tags: Privacy

There are millions of data been generated in various forms around us regularly which is approximately 2.5 quintillion bytes on the daily basis and most of the data are coming from social sites. Social sites are one of the biggest contributor of big…

The wide adoption of IoT technologies has accelerated the accumulation of big data. Recommender systems (RS) is one of the most effective methods to extract user interested items from the huge volume of big data. However, implementing a recommender…

The paper presents a brief introduction to big data and its role in healthcare applications. It is observed that the use of big data architecture and techniques are continuously assisting in managing the expeditious data growth in healthcare…

The success of blockchain-based solutions, not only on a large scale, but since the beginning of the pilot phase, depends on a set of key factors such as performance, efficiency, usability, scalability. In particular, security, privacy and trust are…

The digital transformation brought on by 5G is redefining current models of end-to-end (E2E) connectivity and service reliability to include security-by-design principles necessary to enable 5G to achieve its promise. 5G trustworthiness highlights…

This paper presents a risk assessment in a health IoT system by applying a methodology focused on privacy, security, safety, resilience and reliability. OCARIoT is an IoT system under development that comprehends a variety of components from the…

This paper presents an IIoT systems risk assessment methodology focused on privacy, security, safety, resilience and reliability. The methodology is composed of ten phases that comprehends the risks elements to calculate the probability of a threat…

High penetration of renewable energy, such as wind power, has brought threats to the security and reliability of power systems due to its uncertainty. To deal with hidden dangers of the imbalance of supply and demand, this paper proposes a model of…

Image data security is a key issue in storage, transmission. Some scrambling techniques have been developed to encrypt digital images. However, how to quantitatively measure the scrambling degree of images scrambled by various techniques is an issue.…

Under the guidance of carbon neutralization and carbon peaking goals, the energy structure needs to be continuously adjusted and improved. Research about the advantages of the hydrogen storage system’s efficient and optimized operation in the…

The revolutionary advancement in the capabilities of hardware tools, software packages, and communication techniques gave rise to the Internet of Things-supported drone networks (IoD), thereby enabling smooth communication among devices and…

Lightweight Cryptography (LWC) based Authenticated Encryption with Associative Data (AEAD) cryptographic primitives require fewer computational and energy resources than conventional cryptographic primitives as a single operation of an AEAD scheme…

The proliferation and extensive acceptance of biometrics in many sectors is due to its merits over traditional password-based authentication. Several biometric template protection schemes have been proposed during the last decade to address the…

The so-called Internet of Vehicle (IoV) systems will interconnect numerous vehicles to communicate significant information through an Internet of Things (IoT) enabled network. It has emerged as a promising system wherein various data authentication…

Due to the lack of improper access control policies and decentralized access controllers, security and privacy-aware peer-to-peer (P2P) energy trading among electric vehicles (EVs) and the smart grid is challenging. Most of the solutions reported in…

Cooperative Intelligent Transport System (C-ITS) is a promising technology that aims to improve the traditional transport management systems. In C-ITS infrastructure Autonomous Vehicles (AVs) communicate wirelessly with other AVs, Road Side Units…

With the development of Internet of Vehicles (IoV), the integration of Internet of Things (IoT) and manual vehicles becomes inevitable in Intelligent Transportation Systems (ITS). In ITS, the IoVs communicate wirelessly with other IoVs, Road Side…
Output Formats

atom, dcmes-xml, json, omeka-xml, rss2