A Secure and Privacy-Preserving Opportunistic Computing Framework for Mobile-Healthcare Emergency. With the pervasiveness of smart phones and the advance of wireless body sensor networks (BSNs), mobile Healthcare (m-Healthcare), which extends the operation of Healthcare provider into a pervasive environment for better health monitoring, has attracted considerable interest recently. However, the flourish of m-Healthcare still faces…
A Secure and Verifiable Access Control Scheme for Big Data Storage in Clouds Abstract-Due to the complexity and volume, outsourcing ciphertexts to a cloud is deemed to be one of the most effective approaches for big data storage and access. Nevertheless, verifying the access legitimacy of a user and securely updating a ciphertext in the…
A Secure Optimum Distributed Detection Scheme in Under-Attack Wireless Sensor Networks Abstract-We address the problem of centralized detection of a binary event in the presence of fraction falsi?able sensor nodes (SNs) (i.e., controlled by an attacker) for a bandwidth constrained under attack spatially uncorrelated distributed wireless sensor network (WSN). The SNs send their one-bit test…
A Secure Optimum Distributed Detection Scheme in Under-Attack Wireless Sensor Networks Abstract– In the first place, address the problem of centralized detection of a binary event in the presence of ? fraction falsifiable sensor nodes (SNs) (i.e., controlled by an attacker) for a bandwidthconstrained under ? attack spatially uncorrelated distributed wireless sensor network (WSN). The…
A Secure Payment Scheme with Low Communication and Processing Overhead for Multihop Wireless Networks Abstract? A Secure Payment Scheme with Low Communication and Processing Overhead for Multihop Wireless Networks. Video View Demo [numbers_sections number=”1″ title=”Including =Packages=” last=”no” ] Base Paper Complete Source Code Complete Documentation Complete Presentation Slides Flow Diagram Database File Screenshots Execution Procedure…
A Secure Protocol for Spontaneous Wireless Ad Hoc Networks Creation Abstract? A Secure Protocol for Spontaneous Wireless Ad Hoc Networks Creation.a secure protocol for spontaneous wireless ad hoc networks which uses an hybrid symmetric/asymmetric scheme and the trust between users in order to exchange the initial data and to exchange the secret keys that will…
A secure remote user mutual authentication scheme using smart cards Abstract? Authentication thwarts unauthorised users from accessing resources in insecure network environments. Password authentication based on smart cards is one of the simplest and most ef?cient authentication methods and is commonly deployed to authenticate the legitimacy of remote users. Based on cryptographic techniques, several password…
A Secure-Efficient Data Collection Algorithm Based on Self-Adaptive Sensing Model in Mobile Internet of Vehicles Abstract? Existing research on data collection using wireless mobile vehicle network emphasizes the reliable delivery of information. However, other performance requirements such as life cycle of nodes, stability and security are not set as primary design objectives. This makes data…
A Secured Authentication System for MANETs using voice and Fingerprint Biometrics Abstract?Mobile Adhoc NETworks (MANET) are collections of wireless mobile devices with restricted broadcast range and resources and communication is achieved by relaying data along appropriate routes that are dynamically discovered and maintained through collaboration between the nodes. MANET is a self configuring, dynamic,…
A Security Model for Preserving the Privacy of Medical Big Data in a Healthcare Cloud Using a Fog Computing Facility with Pairing-Based Cryptography Abstract-Nowadays, telemedicine is an emerging healthcare service where the healthcare professionals can diagnose, evaluate,and treat a patient using telecommunication technology. To diagnose and evaluate a patient, the healthcare professionals need to access…
A Security Modeling Approach forWeb-Service-based Business Processes. Several reports indicate that the highest business priorities include: business improvement, security, and IT management. The importance of security and risk management is gaining that even government statements in some cases have imposed the inclusion of security and risk management within business management. Risk assessment has become an…