Search
Now showing items 31-40 of 42
Edge computing-enabled green multisource fusion indoor positioning algorithm based on adaptive particle filter
(
Springer
, 2023 , Article)
Edge computing enables portable devices to provide smart applications, and the indoor positioning technique offers accurate location-based indoor navigation and personalized smart services. To achieve the high positioning ...
Enhanced Beidou user equipment access authentication protocol based on location key
(
Editorial Board of Journal on Communications
, 2022 , Article)
In order to solve the shortcomings of the existing Beidou user equipment access solutions such as prolonged authentication, and in response to the need of user privacy protection, a user equipment access authentication ...
Active Computing Toward 5G Internet of Things
(
Institute of Electrical and Electronics Engineers Inc.
, 2022 , Article)
The Internet of Things (IoT) contains enormous computing resources. How to fully and efficiently use computing power is a very important research issue. This article proposes an active computing (AC) concept toward IoT. ...
Threat-specific security risk evaluation in the cloud
(
Institute of Electrical and Electronics Engineers Inc.
, 2021 , Article)
Existing security risk evaluation approaches (e.g., asset-based) do not consider specific security requirements of individual cloud computing clients in the security risk evaluation. In this paper, we propose a threat-specific ...
Quantifying Satisfaction of Security Requirements of Cloud Software Systems
(
Institute of Electrical and Electronics Engineers Inc.
, 2023 , Article)
The satisfaction of a software requirement is commonly stated as a Boolean value, that is, a security requirement is either satisfied (true) or not (false). However, a discrete Boolean value to measure the satisfaction ...
Design and Implementation of a Threat-Specific Security Risk Assessment Tool
(
Institute of Electrical and Electronics Engineers Inc.
, 2020 , Conference Paper)
Security threats posed to individual cloud computing clients vary depending on their specific security requirements. However, Cloud Providers apply generic security risk assessment approaches which result do not consider ...
Watermarking: A review of software and hardware techniques
(
Institute of Electrical and Electronics Engineers Inc.
, 2018 , Conference Paper)
Watermarking is a well-known technique traditionally used in banknotes and other documents to discourage counterfeiting. It usually consists of semi-transparent symbols embedded on paper. Similar concepts were applied to ...
A Practical Universal Consortium Blockchain Paradigm for Patient Data Portability on the Cloud Utilizing Delegated Identity Management
(
Institute of Electrical and Electronics Engineers Inc.
, 2020 , Conference Paper)
This paper presents a blockchain system that exploits the base modular features of the Hyperledger Fabric framework to allow for a new, patient-centric, practical data portability paradigm. The system empowers patients by ...
Machine learning for the security of healthcare systems based on Internet of Things and edge computing
(
Elsevier
, 2022 , Book chapter)
Using the Internet of Medical Things (IoMT) for treatment and diagnosis has exponentially grown due to its diverse use cases and efficient planning with defined resources. IoMT in the e-healthcare system enables continuous ...
A Testbed Implementation of a Biometric Identity-Based Encryption for IoMT-enabled Healthcare System
(
Association for Computing Machinery
, 2021 , Conference Paper)
Historically, health data was stored locally on the hospital's server as patient health records, and we had to rely on the planned check-up during doctor's visits. Now, we can monitor health continuously and in real-time. ...