Results 31 to 40 of about 672,157 (285)

Successive Decode-and-Forward Relaying With Privacy-Aware Interference Suppression

open access: yesIEEE Access, 2020
Successive relaying holds the promise of achieving spatial diversity gain for single-antenna users while recovering the multiplexing loss due to the half-duplex relaying in B5G/6G.
Jianjing Wei   +3 more
doaj   +1 more source

Forward and Backward Private Searchable Encryption from Constrained Cryptographic Primitives [PDF]

open access: yes, 2017
Using dynamic Searchable Symmetric Encryption, a user with limited storage resources can securely outsource a database to an untrusted server, in such a way that the database can still be searched and updated efficiently.
Bost, Raphael   +2 more
core   +2 more sources

An efficient and private RFID authentication protocol supporting ownership transfer [PDF]

open access: yes, 2013
Radio Frequency IDentification (RFID) systems are getting pervasively deployed in many daily life applications. But this increased usage of RFID systems brings some serious problems together, security and privacy. In some applications, ownership transfer
Arslan, Atakan   +5 more
core   +2 more sources

Survey on privacy protection indoor positioning

open access: yesTongxin xuebao, 2023
Smartphones are usually provided with indoor positioning services by third-party positioning service providers, in which the unique privacy leakage risk has become a major factor limiting its development.How to protect the privacy of users and data in ...
Zhiheng WANG, Yanyan XU
doaj   +2 more sources

Security and privacy issues of physical objects in the IoT: Challenges and opportunities

open access: yesDigital Communications and Networks, 2021
In the Internet of Things (IoT), security and privacy issues of physical objects are crucial to the related applications. In order to clarify the complicated security and privacy issues, the life cycle of a physical object is divided into three stages of
Xuanxia Yao   +5 more
doaj   +1 more source

A Forward Privacy Model for RFID Authentication Protocols [PDF]

open access: yes, 2013
In this paper, we propose a new variant of indistinguishability-based security model for the RFID authentication protocol, which allows an adversary to obtain an authentication result and secret key of a target tag. Ng et al. showed that symmetric-key based RFID authentication protocols cannot be resilient to the above information leakage ...
Moriyama, Daisuke   +2 more
openaire   +1 more source

Location Privacy Protection in Contention Based Forwarding for VANETs [PDF]

open access: yes2010 IEEE Global Telecommunications Conference GLOBECOM 2010, 2010
Compared to traditional wireless network routing protocols, geographic routing provides superior scalability and thus is widely used in vehicular ad hoc networks (VANETs). However, it requires every vehicle to broadcast its location information to its neighboring nodes, and this process will compromise user's location privacy.
Qing Yang   +3 more
openaire   +1 more source

Authentication Scheme for Flexible Charging and Discharging of Mobile Vehicles in the V2G Networks [PDF]

open access: yes, 2016
Navigating security and privacy challenges is one of the crucial requirements in the vehicle-to-grid (V2G) network. Since electric vehicles (EVs) need to provide their private information to aggregators/servers when charging/discharging at different ...
Choi, B.J., Saxena, N.
core   +1 more source

Forward and Backward Private Searchable Encryption for Cloud-Assisted Industrial IoT

open access: yesSensors
In the cloud-assisted industrial Internet of Things (IIoT), since the cloud server is not always trusted, the leakage of data privacy becomes a critical problem. Dynamic symmetric searchable encryption (DSSE) allows for the secure retrieval of outsourced
Tianqi Peng   +7 more
doaj   +1 more source

Secure Multi-Party Computation Based Privacy Preserving Extreme Learning Machine Algorithm Over Vertically Distributed Data

open access: yes, 2015
Especially in the Big Data era, the usage of different classification methods is increasing day by day. The success of these classification methods depends on the effectiveness of learning methods.
Çatak, Ferhat Özgür
core   +1 more source

Home - About - Disclaimer - Privacy