4.6 Article

Cryptographic Algorithms with Data Shorter than the Encryption Key, Based on LZW and Huffman Coding

Related references

Note: Only part of the references are listed.
Article Chemistry, Analytical

Secure Data Transfer Based on a Multi-Level Blockchain for Internet of Vehicles

Hua Yi Lin

Summary: This study proposes a multi-level blockchain framework to ensure information security in the Internet of vehicles. A new transaction block is introduced to ensure the identity of traders and the non-repudiation of transactions through ECDSA. The designed multi-level blockchain architecture improves the efficiency of the block by distributing operations within intra_cluster blockchain and inter_cluster blockchain.

SENSORS (2023)

Article Multidisciplinary Sciences

City-scale synthetic individual-level vehicle trip data

Guilong Li et al.

Summary: This paper aims to address the urgent need for individual-level vehicle trip data in transportation research by generating a synthetic dataset based on historical trip data. The synthetic data strikes a balance between availability and privacy protection. The study conducts multiple experiments to demonstrate the performance and reliability of the synthetic data in different dimensions and granularities, showing consistency with real data on an aggregated level and reasonableness from an individual perspective.

SCIENTIFIC DATA (2023)

Article Computer Science, Hardware & Architecture

Privacy preserving Federated Learning framework for IoMT based big data analysis using edge computing

Akarsh K. Nair et al.

Summary: This article proposes a privacy-preserving framework called Fed_Select, which utilizes FL and edge computing to ensure user anonymity and data security. The framework employs hybrid encryption techniques and differential privacy, and experimental results show its effectiveness in protecting privacy and enhancing security.

COMPUTER STANDARDS & INTERFACES (2023)

Article Computer Science, Artificial Intelligence

A survey of human-computer interaction (HCI) & natural habits-based behavioural biometric modalities for user recognition schemes

Sandeep Gupta et al.

Summary: This article presents a survey on HCI-based and natural habits-based behavioural biometrics for user recognition in IoT systems. Robust and usable user recognition is crucial for the security of emerging IoT ecosystems. Biometrics provide a solution to the limitations of conventional recognition schemes, and this article reviews the state-of-the-art research on touch-stroke, swipe, touch signature, hand-movements, voice, gait, and footstep behavioural biometrics modalities. The article also explores the security, privacy, and usability evaluations to enhance the design of user recognition schemes for IoT applications.

PATTERN RECOGNITION (2023)

Review Computer Science, Information Systems

The Internet of Things (IoT) in healthcare: Taking stock and moving forward

Abderahman Rejeb et al.

Summary: Recent improvements in IoT have led to rapid developments in healthcare. This article provides a summary of previous studies on the applications of IoT in healthcare. Through a comprehensive review and bibliometric analysis, the growth of IoT research in healthcare is objectively summarized. The findings reveal significant research hotspots, including IoT healthcare applications, blockchain applications, AI techniques, 5G telecommunications, and data analytics.

INTERNET OF THINGS (2023)

Article Computer Science, Artificial Intelligence

Mechanism design for data reliability improvement through network-based reasoning model

Nohkyum Kyeong et al.

Summary: The importance of business intelligence is increasing, and this research proposes a new theoretical model to ensure highly reliable data for enhancing business intelligence.

EXPERT SYSTEMS WITH APPLICATIONS (2022)

Article Engineering, Biomedical

Ensuring data integrity of healthcare information in the era of digital health

Mohammad Zarour et al.

Summary: Data integrity remains a persistent issue in the healthcare sector, posing significant health threats and challenges for clinicians. This research aims to describe the threat plot of data integrity, particularly in Saudi Arabia, through attack statistics and propose using a fuzzy analytical hierarchy process to improve data security. The study suggests prioritizing blockchain as a method for data integrity management across Saudi Arabia.

HEALTHCARE TECHNOLOGY LETTERS (2021)

Review Computer Science, Hardware & Architecture

A survey study on Internet of Things resource management

Abishi Chowdhury et al.

JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2018)

Article Computer Science, Information Systems

A comparative study and analysis of some pseudorandom number generator algorithms

Shobhit Sinha et al.

SECURITY AND PRIVACY (2018)

Proceedings Paper Computer Science, Theory & Methods

AES Based Text Encryption Using 12 Rounds with Dynamic Key Selection

Nishtha Mathur et al.

PROCEEDINGS OF INTERNATIONAL CONFERENCE ON COMMUNICATION, COMPUTING AND VIRTUALIZATION (ICCCV) 2016 (2016)

Proceedings Paper Automation & Control Systems

Analysis of RSA based on Quantitating Key Security Strength

Wenxue Tan et al.

CEIS 2011 (2011)

Article Computer Science, Hardware & Architecture

Multi-mode operator for SHA-2 hash functions

Ryan Glabb et al.

JOURNAL OF SYSTEMS ARCHITECTURE (2007)

Article Engineering, Electrical & Electronic

An introduction to block cipher cryptanalysis

C De Cannière et al.

PROCEEDINGS OF THE IEEE (2006)