Search
Now showing items 1-5 of 5
Threat-specific security risk evaluation in the cloud
(
Institute of Electrical and Electronics Engineers Inc.
, 2021 , Article)
Existing security risk evaluation approaches (e.g., asset-based) do not consider specific security requirements of individual cloud computing clients in the security risk evaluation. In this paper, we propose a threat-specific ...
A Testbed Implementation of a Biometric Identity-Based Encryption for IoMT-enabled Healthcare System
(
Association for Computing Machinery
, 2021 , Conference Paper)
Historically, health data was stored locally on the hospital's server as patient health records, and we had to rely on the planned check-up during doctor's visits. Now, we can monitor health continuously and in real-time. ...
A secure and efficient Internet of Things cloud encryption scheme with forensics investigation compatibility based on identity-based encryption
(
Elsevier B.V.
, 2021 , Article)
Data security is a challenge for end-users of cloud services as the users have no control over their data once it is transmitted to the cloud. A potentially corrupt cloud service provider can obtain the end-users’ data. ...
Factors Affecting the Performance of Sub-1 GHz IoT Wireless Networks
(
Hindawi Limited
, 2021 , Article)
Internet of Things (IoT) devices frequently utilize wireless networks operating in the Industrial, Scientific, and Medical (ISM) Sub-1 GHz spectrum bands. Compared with higher frequency bands, the Sub-1 GHz band provides ...
Recent Advances in the Internet-of-Medical-Things (IoMT) Systems Security
(
Institute of Electrical and Electronics Engineers Inc.
, 2021 , Article)
The rapid evolutions in microcomputing, mini-hardware manufacturing, and machine-to-machine (M2M) communications have enabled novel Internet-of-Things (IoT) solutions to reshape many networking applications. Healthcare ...