A Secure Protocol for Spontaneous Wireless Ad Hoc Networks Creation Abstract? A Secure Protocol for Spontaneous Wireless Ad Hoc Networks Creation.a secure protocol for spontaneous wireless ad hoc networks which uses an hybrid symmetric/asymmetric scheme and the trust between users in order to exchange the initial data and to exchange the secret keys that will…
A secure remote user mutual authentication scheme using smart cards Abstract? Authentication thwarts unauthorised users from accessing resources in insecure network environments. Password authentication based on smart cards is one of the simplest and most ef?cient authentication methods and is commonly deployed to authenticate the legitimacy of remote users. Based on cryptographic techniques, several password…
A Secure-Efficient Data Collection Algorithm Based on Self-Adaptive Sensing Model in Mobile Internet of Vehicles Abstract? Existing research on data collection using wireless mobile vehicle network emphasizes the reliable delivery of information. However, other performance requirements such as life cycle of nodes, stability and security are not set as primary design objectives. This makes data…
A Secured Authentication System for MANETs using voice and Fingerprint Biometrics Abstract?Mobile Adhoc NETworks (MANET) are collections of wireless mobile devices with restricted broadcast range and resources and communication is achieved by relaying data along appropriate routes that are dynamically discovered and maintained through collaboration between the nodes. MANET is a self configuring, dynamic,…
A Security Model for Preserving the Privacy of Medical Big Data in a Healthcare Cloud Using a Fog Computing Facility with Pairing-Based Cryptography Abstract-Nowadays, telemedicine is an emerging healthcare service where the healthcare professionals can diagnose, evaluate,and treat a patient using telecommunication technology. To diagnose and evaluate a patient, the healthcare professionals need to access…
A Security Modeling Approach forWeb-Service-based Business Processes. Several reports indicate that the highest business priorities include: business improvement, security, and IT management. The importance of security and risk management is gaining that even government statements in some cases have imposed the inclusion of security and risk management within business management. Risk assessment has become an…
A Segmentation and Graph-based Sequence Matching Method for Video Copy Detection Abstract? We propose in this paper a segmentation and graph-based video sequence matching method for video copy detection. Specifically, due to the good stability and discriminative ability of local features, we use SIFT descriptor for video content description. However, matching based on SIFT…
A Selective Encryption Method To Ensure Confidentiality For Big Sensing Data Streams Abstract-Privacy has become a considerable issue when the applications of big data are dramatically growing in cloud computing. The benefits of the implementation for these emerging technologies have improved or changed service models and improve application performances in various perspectives. However, the remarkably…
A Self-Adaptive Sleep/Wake-up Scheduling Approach for Wireless Sensor Networks Abstract-Sleep/wake-up scheduling is one of the fundamental problems in Wireless Sensor Networks (WSNs), since the energy of sensor nodes is limited and they are usually unrechargeable. The purpose of sleep/wake-up scheduling is to save the energy of each node by keeping nodes in sleep mode as…
A Set of Complexity Measures Designed for Applying Meta-Learning to Instance Selection Abstract? A Set of Complexity Measures Designed for Applying Meta-Learning to Instance Selection. Some authors have approached the instance selection problem from a meta-learning perspective. In their work, they try to ?nd relationships between the performance of some methods from this ?eld and…
A SIFT-based forensic method for copy-move attack detection and transformation recovery Abstract?One of the principal problems in image forensics is determining if a particular image is authentic or not. This can be a crucial task when images are used as basic evidence to influence judgment like, for example, in a court of law.< Final Year…