Improving Both Quantity and Quality: Incentive Mechanism for Social Mobile Crowdsensing Architecture
Mobile crowdsensing has emerged as an efficient paradigm for performing large-scale sensing tasks. Improving both the quantity and quality of users is still the pivotal problem for mobile crowdsensing system.
Jia Xu+4 more
doaj +1 more source
Secure Data of Industrial Internet of Things in a Cement Factory Based on a Blockchain Technology
The Industrial Internet of Things (IIoT) has become a pivotal field of development that can increase the efficiency of real-time collection, recording, analysis, and control of the entire activities of various machines, and can actively enhance quality ...
Samir M. Umran+4 more
doaj +1 more source
Detecting periodic subsequences in cyber security data
Statistical approaches to cyber-security involve building realistic probability models of computer network data. In a data pre-processing phase, separating automated events from those caused by human activity should improve statistical model building and
Heard, Nick+2 more
core +1 more source
Homomorphic encryption location privacy-preserving scheme based on Markov model
Homomorphic encryption location privacy-preserving scheme based on Markov mode was proposed to solve the problem of location privacy and query privacy protection in location-based service systems.
Kai ZHOU,Jian-qiong HE+2 more
doaj +1 more source
Data Security Sharing and Storage Based on a Consortium Blockchain in a Vehicular Ad-hoc Network
A vehicular ad-hoc network (VANET) can improve the flow of traffic to facilitate intelligent transportation and to provide convenient information services, where the goal is to provide self-organizing data transmission capabilities for vehicles on the ...
Xiaohong Zhang, Xiaofeng Chen
semanticscholar +1 more source
A Data Security Enhanced Access Control Mechanism in Mobile Edge Computing
Mobile edge computing, with characteristics of position awareness, mobile support, low latency, decentralization, and distribution, has received widespread attention from industry and academia, and has been applied to application areas such as ...
Yichen Hou+5 more
semanticscholar +1 more source
Strengthening Data Security: an Holistic Approach [PDF]
In the light of heightened concern around data security, this paper highlights some of the measures that can be used to develop and strengthen security in data archiving. The paper includes discussion of the different approaches that can be taken towards
Bolton, S, Woollard, M
core
Types for Location and Data Security in Cloud Environments [PDF]
Cloud service providers are often trusted to be genuine, the damage caused by being discovered to be attacking their own customers outweighs any benefits such attacks could reap.
Chothia, Tom+2 more
core +3 more sources
Analysis and Improvement of Entropy Estimators in NIST SP 800-90B for Non-IID Entropy Sources
Random number generators (RNGs) are essential for cryptographic applications. In most practical applications, the randomness of RNGs is provided by entropy sources.
Shuangyi Zhu+4 more
doaj +1 more source
PUFchain: A Hardware-Assisted Blockchain for Sustainable Simultaneous Device and Data Security in the Internet of Everything (IoE) [PDF]
This article presents the first-ever blockchain that can simultaneously handle device and data security, which is important for the emerging Internet-of-Everything (IoE).
S. Mohanty+3 more
semanticscholar +1 more source