89 results on '"security and privacy"'
Search Results
2. PacDroid: lightweight android malware detection using permissions and intent features
3. Deep learning-based intrusion detection system for in-vehicle networks with knowledge graph and statistical methods
4. A Decade Review of Authentication and Communication Methods in IoT Environment
5. BeLAS: Blockchain-envisioned lightweight authentication scheme for securing eHealth records
6. Cognitive Tracing Data Trails: Auditing Data Provenance in Discriminative Language Models Using Accumulated Discrepancy Score
7. On the adoption and deployment of secure and privacy-preserving IIoT in smart manufacturing: a comprehensive guide with recent advances
8. MLRA-Sec: an adaptive and intelligent cyber-security-assessment model for internet of medical things (IoMT)
9. Restoring private autism dataset from sanitized database using an optimized key produced from enhanced combined PSO-GWO framework
10. Digital transformation for sustainable health and well-being: a review and future research directions
11. Federated learning incentivize with privacy-preserving for IoT in edge computing in the context of B5G
12. Review of Security and Privacy-Based IoT Smart Home Access Control Devices
13. A systematic review and research challenges on phishing cyberattacks from an electroencephalography and gaze-based perspective
14. Circulation of legitimate information over VANETs using threshold signature scheme
15. Blockchain-as-a-Service for the Security Challenges and Solutions in the Internet of Things Environment
16. DEMRISEC: security enhancement of patient data in decentralized medical records with IPFS
17. Secured COVID-19 CT image classification based on human-centric IoT and vision transformer
18. Protecting IoT devices from security attacks using effective decision-making strategy of appropriate features
19. A Novel Enhanced Approach for Security and Privacy Preserving in IoT Devices with Federal Learning Technique
20. The influence of dropout and residual connection against membership inference attacks on transformer model: a neuro generative disease case study
21. ML-IDS: an efficient ML-enabled intrusion detection system for securing IoT networks and applications
22. Improving the performance of authentication protocols using efficient modular multi exponential technique
23. Blockchain-based internet of things security architecture and applications
24. Two factor authentication protocol for IoT based healthcare monitoring system
25. Gradient leakage attacks in federated learning
26. Peer-to-peer privacy-preserving vertical federated learning without trusted third-party coordinator
27. Secure data sharing with blockchain for remote health monitoring applications: a review
28. PPDU: dynamic graph publication with local differential privacy
29. Multi-cloud applications: data and code fragmentation for improved security
30. Expressible access control scheme for data sharing and collaboration in cloud-centric Internet of medical Things system
31. Trustworthy Healthcare Cloud Storage Auditing Scheme (TCSHAS) with blockchain-based incentive mechanism
32. Evicting and filling attack for linking multiple network addresses of Bitcoin nodes
33. Privacy-preserving cloud-edge collaborative learning without trusted third-party coordinator
34. Secure data authentication and access control protocol for industrial healthcare system
35. A Reliable Protocol for Data Aggregation and Optimized Routing in IoT WSNs based on Machine Learning
36. Security enhancement in cellular networks employing D2D friendly jammer for V2V communication
37. Fog Computing for 5G-Enabled Tactile Internet: Research Issues, Challenges, and Future Research Directions
38. Multiview deep learning-based attack to break text-CAPTCHAs
39. A privacy-preserving multidimensional data aggregation scheme with secure query processing for smart grid
40. Privacy Preserved Medical Service Provider Selection in Cloud-based Wireless Body Area Network
41. Secure transmission technique for data in IoT edge computing infrastructure
42. RAKS: robust authentication and key agreement scheme for satellite infrastructure
43. RAPCHI: Robust authentication protocol for IoMT-based cloud-healthcare infrastructure
44. A secure authentication technique for connecting different IoT devices in the smart city infrastructure
45. A Secure IIoT Gateway Architecture based on Trusted Execution Environments
46. Bloccess: Enabling Fine-Grained Access Control Based on Blockchain
47. Detection and prevention of DDoS attacks on M-healthcare sensitive data: a novel approach
48. A vector-space-based lightweight RFID authentication protocol
49. AnonSURP: an anonymous and secure ultralightweight RFID protocol for deployment in internet of vehicles systems
50. A secure and efficient key agreement framework for critical energy infrastructure using mobile device
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.