Search
Now showing items 1-8 of 8
Verifying cloud service-level agreement by a third-party auditor
(
John Wiley & Sons, Ltd.
, 2014 , Article)
In this paper, we study the important issue of verifying service-level agreement (SLA) with an untrusted cloud and present an SLA verification framework that utilizes a third-party auditor (TPA). A cloud provides users ...
Design of Lightweight Authentication and Key Agreement Protocol for Vehicular Ad Hoc Networks
(
Institute of Electrical and Electronics Engineers Inc.
, 2017 , Article)
Due to the widespread popularity in both academia and industry, vehicular ad hoc networks (VANETs) have been used in a wide range of applications starting from intelligent transportation to e-health and itinerary planning. ...
Impact of the Wireless Network's PHY Security and Reliability on Demand-Side Management Cost in the Smart Grid
(
Institute of Electrical and Electronics Engineers Inc.
, 2017 , Article)
We investigate the impact of the wireless network's physical layer (PHY) security and reliability on demand-side management operation in the smart grid. We assume that consumers communicate their energy demands with the ...
A Novel Deep Learning Strategy for Classifying Different Attack Patterns for Deep Brain Implants
(
Institute of Electrical and Electronics Engineers Inc.
, 2019 , Article)
Deep brain stimulators (DBSs), a widely used and comprehensively acknowledged restorative methodology, are a type of implantable medical device which uses electrical stimulation to treat neurological disorders. These devices ...
The impact of trust, security, and privacy on individual's use of the internet for online shopping and social media: a multi-cultural study
(
Inderscience Publishers
, 2019 , Article)
This paper examines through the lens of expectancy-valence theory the impact of trust, privacy, and security on the decision to use the internet for online shopping and social media. It also investigates the moderating ...
Battery status-aware authentication scheme for V2G networks in smart grid
(2013 , Article)
Vehicle-to-grid (V2G) is emerging as an attractive paradigm in smart grid, and provides power and information services by periodically collecting power status of battery vehicles (BVs). During a BV's interaction with power ...
Secure and distributed data discovery and dissemination in wireless sensor networks
(
IEEE Computer Society
, 2015 , Article)
A data discovery and dissemination protocol for wireless sensor networks (WSNs) is responsible for updating configuration parameters of, and distributing management commands to, the sensor nodes. All existing data discovery ...
HoliTrust-A holistic cross-domain trust management mechanism for service-centric internet of things
(
Institute of Electrical and Electronics Engineers Inc.
, 2019 , Article)
Internet of Things (IoT) is proposed and used in diverse application domains. In IoT, nodes commonly have a low capacity to maintain security on their own expenses, which increases the vulnerability for several attacks. ...