Search Results - "Domenic, Kamenyi"
-
1
Provably Secure Heterogeneous Access Control Scheme for Wireless Body Area Network
Published in Journal of medical systems (01-06-2018)“…Wireless body area network (WBAN) provides a medium through which physiological information could be harvested and transmitted to application provider (AP) in…”
Get full text
Journal Article -
2
Preserving users' privacy for continuous query services in road networks
Published in 2013 6th International Conference on Information Management, Innovation Management and Industrial Engineering (01-11-2013)“…Mobile devices (e.g., smart phones) and location based services are very popular with today's users. Due to this popularity, there has been a tremendous…”
Get full text
Conference Proceeding -
3
Rumor Riding: An Anonymity Approach for Decentralized Peer to Peer Systems
Published in Wireless personal communications (01-11-2014)“…The anonymizing peer to peer (P2P) system is frequently incurred additional expense in order to efficiency transfer and various systems execute to disguise the…”
Get full text
Journal Article -
4
Modeling the spreading behavior of passive worms in mobile social networks
Published in 2013 6th International Conference on Information Management, Innovation Management and Industrial Engineering (01-11-2013)“…Spreading behavior of passive worms, in mobile social networks has raised a lot of concerns for malicious worms researchers in network security for some time…”
Get full text
Conference Proceeding -
5
Optimized MHealth Batch Verification for a Variant of DSA
Published in 2014 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (01-10-2014)“…With more and more research focusing on Health Care services, there is need for efficient authentication by use of digital signatures. Currently, the DSA is…”
Get full text
Conference Proceeding -
6
VANET Cluster-on-Demand Minimum Spanning Tree (MST) Prim clustering algorithm
Published in 2013 International Conference on Computational Problem-Solving (ICCP) (01-10-2013)“…Vehicle to Vehicle (V2V) communication offers great potential as far as information dissemination in VANETs is concerned. Research has shown that clustering…”
Get full text
Conference Proceeding -
7
Velocity similarity anonymization for continuous query Location based services
Published in 2013 International Conference on Computational Problem-Solving (ICCP) (01-10-2013)“…In this paper, we introduced a novel query privacy algorithm called the direction speed dynamic cloaking algorithm (DSDCA) for continuous query Location based…”
Get full text
Conference Proceeding