Collection
2 - Track on Security and Privacy
- Submission status
- Open
- Open for submission from
- 02 June 2022
- Submission deadline
- Ongoing
-
Editors
-
Rongxing Lu
-
Articles (55 in this collection)
-
-
A lightweight and anonymous mutual authentication and key agreement scheme for WBAN
Authors
- Saba Marandi
- Farokhlagha Moazami
- Amir Malekinezhad
- Content type: OriginalPaper
- Published: 23 May 2024
-
Masked image: Visually protected image dataset privacy-preserving scheme for convolutional neural networks
Authors (first, second and last of 6)
- Xiaoyu Kou
- Fengwei Wang
- Zhe Liu
- Content type: OriginalPaper
- Published: 22 May 2024
-
BACASE-SH: Blockchain-based authenticated certificate-less asymmetric searchable encryption for smart healthcare
Authors
- Arian Arabnouri
- Alireza Shafieinejad
- Content type: OriginalPaper
- Published: 04 May 2024
-
A supervised privacy preservation transaction system for aviation business
Authors
- Xingguang Zhou
- Weihan Li
- Lin Zhong
- Content type: OriginalPaper
- Published: 10 April 2024
-
An energy efficient Swan Intelligent based Clustering Technique (SICT) with fuzzy based secure routing protocol in IoT
Authors
- R. Shanmugapriya
- Santhosh Kumar SVN
- Content type: OriginalPaper
- Published: 04 April 2024
-
Enhancing intrusion detection using wireless sensor networks: A novel ahp-madm aggregated multiple type 3 fuzzy logic-based k-barriers prediction system
Authors (first, second and last of 7)
- Anirban Tarafdar
- Azharuddin Sheikh
- Uttam Kumar Bera
- Content type: OriginalPaper
- Published: 26 March 2024
-
A blockchain based lightweight and secure access control framework for IoT-enabled supply chain
Authors
- Rashmi Raj
- Mohona Ghosh
- Content type: OriginalPaper
- Published: 08 March 2024
-
A personalized and efficient EMR sharing and management scheme based on smart contracts
Authors (first, second and last of 4)
- Xiaohui Yang
- Kun Zhang
- Peiyin Zhao
- Content type: OriginalPaper
- Published: 06 March 2024
-
A lightweight privacy preserving distributed certificate-less aggregate based mutual authentication scheme for vehicular adhoc networks
Authors
- Y. Rajkumar
- S. V. N. Santhosh Kumar
- Content type: OriginalPaper
- Published: 23 February 2024
-
Intrusion detection system extended CNN and artificial bee colony optimization in wireless sensor networks
Authors (first, second and last of 4)
- K. Yesodha
- M. Krishnamurthy
- A. Kannan
- Content type: OriginalPaper
- Published: 16 February 2024
-
Secure and flexible authorized data sharing for smart grid
Authors
- Yawen Feng
- Shengke Zeng
- Content type: OriginalPaper
- Published: 13 February 2024
-
Public key authenticated encryption with field-free subset conjunctive and disjunctive keyword search against keyword guessing attacks
Authors
- Venkata Bhikshapathi Chenam
- Suneeth Yadav Tummala
- Syed Taqi Ali
- Content type: OriginalPaper
- Published: 08 February 2024
-
A trustworthy and reliable multi-keyword search in blockchain-assisted cloud-edge storage
Authors (first, second and last of 4)
- Xingchen Liu
- Shaohui Zhang
- Reza Malekian
- Content type: OriginalPaper
- Published: 07 February 2024
- Pages: 985 - 1000
-
A website fingerprinting technology with time-sampling
Authors (first, second and last of 5)
- Xueshu Hong
- Shaoyong Li
- Fan Wu
- Content type: OriginalPaper
- Published: 06 February 2024
- Pages: 944 - 960
-
Extended chaotic map-based key management for hierarchical access control in e-medicine systems
Authors (first, second and last of 6)
- Tian-Fu Lee
- I-Pin Chang
- Rui-Yu Chen
- Content type: OriginalPaper
- Published: 31 January 2024
- Pages: 858 - 870
-
Preserving location privacy against inference attacks in indoor positioning system
Authors
- D Hemkumar
- Content type: OriginalPaper
- Published: 24 January 2024
- Pages: 784 - 799
-
SEE2PK: Secure and energy efficient protocol based on pairwise key for hierarchical wireless sensor network
Authors (first, second and last of 4)
- Anurag Shukla
- Sarsij Tripathi
- Deepak Singh
- Content type: OriginalPaper
- Published: 17 January 2024
- Pages: 701 - 721
-
A pairing-free certificate-based key-insulated aggregate signature scheme for wireless medical sensor networks
Authors (first, second and last of 5)
- Min Liu
- Liangliang Wang
- Baodong Qin
- Content type: OriginalPaper
- Published: 15 January 2024
- Pages: 685 - 700
-
Flexible symmetric predicate encryption for data privacy in IoT environments
Authors (first, second and last of 4)
- Qingquan Bian
- Yue Zhang
- Axin Wu
- Content type: OriginalPaper
- Published: 11 January 2024
- Pages: 656 - 664
-
Secret sharing based RFID protocol using ECC for TMIS
Authors
- Haradhan Ghosh
- Pramod Kumar Maurya
- Satya Bagchi
- Content type: OriginalPaper
- Published: 09 January 2024
- Pages: 624 - 638
-
SAKMR: Industrial control anomaly detection based on semi-supervised hybrid deep learning
Authors (first, second and last of 4)
- Shijie Tang
- Yong Ding
- Huiyong Wang
- Content type: OriginalPaper
- Published: 09 January 2024
- Pages: 612 - 623
-
GWO-SMSLO: Grey wolf optimization based clustering with secured modified Sea Lion optimization routing algorithm in wireless sensor networks
Authors
- K. Dinesh
- Santhosh Kumar SVN
- Content type: OriginalPaper
- Published: 05 January 2024
- Pages: 585 - 611
-
Unveiling DoH tunnel: Toward generating a balanced DoH encrypted traffic dataset and profiling malicious behavior using inherently interpretable machine learning
Authors
- Sepideh Niktabe
- Arash Habibi Lashkari
- Arousha Haghighian Roudsari
- Content type: OriginalPaper
- Published: 23 December 2023
- Pages: 507 - 531
-
Lightweight secure authentication and key agreement technique for smart grid
Authors
- Disuja Kumari
- Karan Singh
- Content type: OriginalPaper
- Published: 22 December 2023
- Pages: 451 - 478
-
A Robust Smart Card based Authentication and Key Agreement Scheme for WSN using Fuzzy Extractor
Authors (first, second and last of 4)
- Rituparna Paul
- Shanvendra Rai
- Preetisudha Meher
- Content type: OriginalPaper
- Published: 22 December 2023
- Pages: 432 - 450
-
Cryptanalysis of full round FUTURE with multiple biclique structures
Authors (first, second and last of 4)
- Himadry Sekhar Roy
- Prakash Dey
- Avishek Adhikari
- Content type: OriginalPaper
- Published: 19 December 2023
- Pages: 397 - 409
-
Lightweight two-factor authentication framework with privacy preserving for smart eHealth
Authors
- Patruni Muralidhara Rao
- B. D. Deebak
- Content type: OriginalPaper
- Published: 16 December 2023
- Pages: 373 - 396
-
A lattice-based unordered certificateless aggregate signature scheme for cloud medical health monitoring system
Authors (first, second and last of 4)
- Songshou Dong
- Yanqing Yao
- Yuguang Yang
- Content type: OriginalPaper
- Published: 07 December 2023
- Pages: 284 - 296
-
SVFGNN: A privacy-preserving vertical federated graph neural network model training framework based on split learning
Authors
- Yanjun Liu
- Hongwei Li
- Meng Hao
- Content type: OriginalPaper
- Published: 01 December 2023
- Pages: 246 - 260
-
Pre-trained language model-enhanced conditional generative adversarial networks for intrusion detection
Authors (first, second and last of 6)
- Fang Li
- Hang Shen
- Xiaodong Miao
- Content type: OriginalPaper
- Published: 25 November 2023
- Pages: 227 - 245
-
Reactive handover coordination system with regenerative blockchain principles for swarm unmanned aerial vehicles
Authors (first, second and last of 4)
- S. Rajasoundaran
- S. V. N. Santhosh Kumar
- Arputharaj Kannan
- Content type: OriginalPaper
- Published: 26 October 2023
- Pages: 89 - 114
-
A secure routing protocol using hybrid deep regression based trust evaluation and clustering for mobile ad-hoc network
Authors (first, second and last of 4)
- Meena Rao
- Parul Chaudhary
- Geetika Dhand
- Content type: OriginalPaper
- Published: 02 October 2023
- Pages: 2794 - 2810
-
A lightweight block encryption algorithm for narrowband internet of things
Authors
- Guosheng Zhao
- Huan Chen
- Jian Wang
- Content type: OriginalPaper
- Published: 21 September 2023
- Pages: 2775 - 2793
-
Hybrid Grey PIPRECIA and Grey OCRA method-based dynamic multi-criteria decision-making model for mitigating non-cooperating node attacks in WSNs
Authors (first, second and last of 4)
- S. Madhavi
- R. Praveen
- S. M. Udhaya Sankar
- Content type: OriginalPaper
- Published: 30 August 2023
- Pages: 2607 - 2629
-
Quantum secure two party authentication protocol for mobile devices
Authors (first, second and last of 4)
- Bshisht Moony
- Amit K. Barnwal
- Dheerendra Mishra
- Content type: OriginalPaper
- Published: 24 August 2023
- Pages: 2548 - 2559
-
IMDRPL: Identifying and eliminating malicious devices using DIO and DAO ICMP control messages in RPL-based protocol
Authors
- P. Deepavathi
- C. Mala
- Content type: OriginalPaper
- Published: 10 August 2023
- Pages: 2380 - 2398
-
Lightweight multi-departmental data sharing scheme based on consortium blockchain
Authors (first, second and last of 5)
- Xueyan Liu
- Linpeng Li
- Tao Liu
- Content type: OriginalPaper
- Published: 10 August 2023
- Pages: 2399 - 2414
-
A bayesian-based distributed trust management scheme for connected vehicles’ security
Authors
- Gopal Singh Rawat
- Karan Singh
- Content type: OriginalPaper
- Published: 22 July 2023
- Pages: 2290 - 2306
-
A verifiable and privacy-preserving blockchain-based federated learning approach
Authors (first, second and last of 5)
- Irshad Ullah
- Xiaoheng Deng
- Husnain Mushtaq
- Content type: OriginalPaper
- Published: 19 July 2023
- Pages: 2256 - 2270
-
Peer-to-peer privacy-preserving vertical federated learning without trusted third-party coordinator
Authors (first, second and last of 5)
- Xiaopeng Yu
- Jie Feng
- Dianhua Tang
- Content type: OriginalPaper
- Published: 12 July 2023
- Pages: 2242 - 2255
-
Machine Learning based intrusion detection systems for connected autonomous vehicles: A survey
Authors (first, second and last of 7)
- Jay Nagarajan
- Pegah Mansourian
- Marc Kneppers
- Content type: ReviewPaper
- Published: 10 July 2023
- Pages: 2153 - 2185
-
TEA-EKHO-IDS: An intrusion detection system for industrial CPS with trustworthy explainable AI and enhanced krill herd optimization
Authors
- S. Sivamohan
- S. S. Sridhar
- S. Krishnaveni
- Content type: OriginalPaper
- Published: 27 June 2023
- Pages: 1993 - 2021
-
A Lightweight PUF based Multi-factor Authentication Technique for Intelligent Smart Healthcare System
Authors
- Ravi Raushan Kumar Chaudhary
- Kakali Chatterjee
- Content type: OriginalPaper
- Published: 27 June 2023
- Pages: 1975 - 1992
-
Bit flipping attack detection in low power wide area networks using a deep learning approach
Authors
- Faezeh Alizadeh
- Amir Jalaly Bidgoly
- Content type: OriginalPaper
- Published: 13 June 2023
- Pages: 1916 - 1926
-
A searchable encryption scheme with hidden search pattern and access pattern on distributed cloud system
Authors
- Shengchen Duan
- Hong Liu
- Lize Gu
- Content type: OriginalPaper
- Published: 25 May 2023
- Pages: 1716 - 1738
-
HAP-SG: Heterogeneous authentication protocol for smart grid
Authors
- Nkurunziza Egide
- Fagen Li
- Content type: OriginalPaper
- Published: 08 May 2023
- Pages: 1365 - 1379
-
SDRLAP: A secure lightweight RFID mutual authentication protocol based on PUF with strong desynchronization resistance
Authors
- Tao Li
- Yali Liu
- Jianting Ning
- Content type: OriginalPaper
- Published: 24 April 2023
- Pages: 1652 - 1667
-
An identity-based traceable ring signatures based on lattice
Authors (first, second and last of 5)
- Junbin Liang
- Qiong Huang
- Man Ho Allen Au
- Content type: OriginalPaper
- Published: 29 March 2023
- Pages: 1270 - 1285
-
ESA-FedGNN: Efficient secure aggregation for federated graph neural networks
Authors (first, second and last of 4)
- Yanjun Liu
- Hongwei Li
- Meng Hao
- Content type: OriginalPaper
- Published: 23 March 2023
- Pages: 1257 - 1269