Works matching IS 27729184 AND DT 2023 AND VI 1
Results: 20
Towards insighting cybersecurity for healthcare domains: A comprehensive review of recent practices and trends.
- Published in:
- Cyber Security & Applications, 2023, v. 1, p. 1, doi. 10.1016/j.csa.2023.100016
- By:
- Publication type:
- Article
Securing distributed systems: A survey on access control techniques for cloud, blockchain, IoT and SDN.
- Published in:
- Cyber Security & Applications, 2023, v. 1, p. 1, doi. 10.1016/j.csa.2023.100015
- By:
- Publication type:
- Article
Secure session key pairing and a lightweight key authentication scheme for liable drone services.
- Published in:
- Cyber Security & Applications, 2023, v. 1, p. 1, doi. 10.1016/j.csa.2022.100012
- By:
- Publication type:
- Article
Secure distributed data integrity auditing with high efficiency in 5G-enabled software-defined edge computing.
- Published in:
- Cyber Security & Applications, 2023, v. 1, p. 1, doi. 10.1016/j.csa.2022.100004
- By:
- Publication type:
- Article
Edge intelligent collaborative privacy protection solution for smart medical.
- Published in:
- Cyber Security & Applications, 2023, v. 1, p. 1, doi. 10.1016/j.csa.2022.100010
- By:
- Publication type:
- Article
Sanitizable signature scheme with privacy protection for electronic medical data sharing.
- Published in:
- Cyber Security & Applications, 2023, v. 1, p. 1, doi. 10.1016/j.csa.2023.100018
- By:
- Publication type:
- Article
Quantum communication with RLP quantum resistant cryptography in industrial manufacturing.
- Published in:
- Cyber Security & Applications, 2023, v. 1, p. 1, doi. 10.1016/j.csa.2023.100019
- By:
- Publication type:
- Article
PPT-LBS: Privacy-preserving top-k query scheme for outsourced data of location-based services.
- Published in:
- Cyber Security & Applications, 2023, v. 1, p. 1, doi. 10.1016/j.csa.2022.100007
- By:
- Publication type:
- Article
Hybrid defense mechanism against malicious packet dropping attack for MANET using game theory.
- Published in:
- Cyber Security & Applications, 2023, v. 1, p. 1, doi. 10.1016/j.csa.2022.100011
- By:
- Publication type:
- Article
Secure authentication schemes in cloud computing with glimpse of artificial neural networks: A review.
- Published in:
- Cyber Security & Applications, 2023, v. 1, p. 1, doi. 10.1016/j.csa.2022.100002
- By:
- Publication type:
- Article
Design of blockchain-enabled secure smart health monitoring system and its testbed implementation.
- Published in:
- Cyber Security & Applications, 2023, v. 1, p. 1, doi. 10.1016/j.csa.2023.100020
- By:
- Publication type:
- Article
Cryptanalysis on "a secure three-factor user authentication and key agreement protocol for TMIS with user anonymity".
- Published in:
- Cyber Security & Applications, 2023, v. 1, p. 1, doi. 10.1016/j.csa.2022.100008
- By:
- Publication type:
- Article
Cryptanalysis of Secure ECC-Based Three Factor Mutual Authentication Protocol for Telecare Medical Information System.
- Published in:
- Cyber Security & Applications, 2023, v. 1, p. 1, doi. 10.1016/j.csa.2023.100013
- By:
- Publication type:
- Article
Blockchain-powered distributed data auditing scheme for cloud-edge healthcare system.
- Published in:
- Cyber Security & Applications, 2023, v. 1, p. 1, doi. 10.1016/j.csa.2023.100017
- By:
- Publication type:
- Article
Bilinear pairing-based access control and key agreement scheme for smart transportation.
- Published in:
- Cyber Security & Applications, 2023, v. 1, p. 1, doi. 10.1016/j.csa.2022.100001
- By:
- Publication type:
- Article
A secure and efficient DSSE scheme with constant storage costs in smart devices.
- Published in:
- Cyber Security & Applications, 2023, v. 1, p. 1, doi. 10.1016/j.csa.2022.100006
- By:
- Publication type:
- Article
A review of deep learning models to detect malware in Android applications.
- Published in:
- Cyber Security & Applications, 2023, v. 1, p. 1, doi. 10.1016/j.csa.2023.100014
- By:
- Publication type:
- Article
An efficient IoT group association and data sharing mechanism in edge computing paradigm.
- Published in:
- Cyber Security & Applications, 2023, v. 1, p. 1, doi. 10.1016/j.csa.2022.100003
- By:
- Publication type:
- Article
An advanced and secure framework for conducting online examination using blockchain method.
- Published in:
- Cyber Security & Applications, 2023, v. 1, p. 1, doi. 10.1016/j.csa.2022.100005
- By:
- Publication type:
- Article
A decentralised KYC based approach for microfinance using blockchain technology.
- Published in:
- Cyber Security & Applications, 2023, v. 1, p. 1, doi. 10.1016/j.csa.2022.100009
- By:
- Publication type:
- Article