Search Results - "Hassan, Alzubair"
-
1
Efficient privacy-preserving authentication protocol using PUFs with blockchain smart contracts
Published in Computers & security (01-10-2020)“…The Internet of Things devices generates a huge amount of sensitive data. Machine learning is the standard processing paradigm for intelligently handling the…”
Get full text
Journal Article -
2
Greedy Firefly Algorithm for Optimizing Job Scheduling in IoT Grid Computing
Published in Sensors (Basel, Switzerland) (23-01-2022)“…The Internet of Things (IoT) is defined as interconnected digital and mechanical devices with intelligent and interactive data transmission features over a…”
Get full text
Journal Article -
3
An Efficient Outsourced Privacy Preserving Machine Learning Scheme With Public Verifiability
Published in IEEE access (2019)“…Cloud computing has been widely applied in numerous applications for storage and data analytics tasks. However, cloud servers engaged through a third party…”
Get full text
Journal Article -
4
Identity-Based User Authenticated Key Agreement Protocol for Multi-Server Environment with Anonymity
Published in Mobile networks and applications (01-06-2019)“…A multi-server environment is an important application paradigm in the Internet of Things (IoT). It enables a user access services from different vendors…”
Get full text
Journal Article -
5
PKE-ET-HS: Public Key Encryption with Equality Test for Heterogeneous Systems in IoT
Published in Wireless personal communications (01-07-2020)“…With the continuous development of the Internet of Things (IoT), a growing number of users choose to store the data collected from their smart devices on a…”
Get full text
Journal Article -
6
An Efficient Cryptosystem for Video Surveillance in the Internet of Things Environment
Published in Complexity (New York, N.Y.) (2019)“…Surveillance systems paradigm envisions the pervasive interconnection and cooperation of interactive devices over the Internet infrastructure. Nevertheless,…”
Get full text
Journal Article -
7
Design-Time Reliability Prediction Model for Component-Based Software Systems
Published in Sensors (Basel, Switzerland) (06-04-2022)“…Software reliability is prioritised as the most critical quality attribute. Reliability prediction models participate in the prevention of software failures…”
Get full text
Journal Article -
8
Expert Finding Systems: A Systematic Review
Published in Applied sciences (01-10-2019)“…The data overload problem and the specific nature of the experts’ knowledge can hinder many users from finding experts with the expertise they required. There…”
Get full text
Journal Article -
9
Cloud Dynamic Load Balancing and Reactive Fault Tolerance Techniques: A Systematic Literature Review (SLR)
Published in IEEE access (2022)“…The computational cloud aims to move traditional computing from personal computers to cloud providers on the internet. Cloud security represents an important…”
Get full text
Journal Article -
10
Towards Secure Big Data Analysis via Fully Homomorphic Encryption Algorithms
Published in Entropy (Basel, Switzerland) (06-04-2022)“…Privacy-preserving techniques allow private information to be used without compromising privacy. Most encryption algorithms, such as the Advanced Encryption…”
Get full text
Journal Article -
11
A Group Identification Protocol with Leakage Resilience of Secret Sharing Scheme
Published in Complexity (New York, N.Y.) (2020)“…Secret sharing has been study for many years and has had a number of real-word applications. There are several methods to construct the secret-sharing schemes…”
Get full text
Journal Article -
12
A Secure User Authentication Protocol for Heterogeneous Mobile Environments
Published in IEEE access (2022)“…Recently, mobile devices have become extensively important to our daily needs. The user authentication protocols with the key agreement are required to solve…”
Get full text
Journal Article -
13
Authentication and privacy schemes for vehicular ad hoc networks (VANETs): A survey
Published in Vehicular Communications (01-04-2019)“…The intelligent transportation system (ITS) is made possible and practical due to vehicular ad hoc networks (VANETs) that helps improve drivers safeties and…”
Get full text
Journal Article -
14
A blockchain-based attribute-based signcryption scheme to secure data sharing in the cloud
Published in Journal of systems architecture (01-01-2020)“…Traditional cloud data sharing schemes have relied on the architecture of the network and large storage providers. However, these storage providers work as…”
Get full text
Journal Article -
15
An efficient attribute-based online/offline searchable encryption and its application in cloud-based reliable smart grid
Published in Journal of systems architecture (01-09-2019)“…Recently the cloud computing popularity is becoming high, and most of the organizations turned to outsource their sensitive data and maintenance to the cloud…”
Get full text
Journal Article -
16
Multiple-level threshold load balancing in distributed SDN controllers
Published in Computer networks (Amsterdam, Netherlands : 1999) (24-10-2021)“…The distributed Software-Defined Networking (SDN) approach has been adopted to address the scalability issue linked to the use of a single SDN controller,…”
Get full text
Journal Article -
17
A privacy preserving federated learning scheme using homomorphic encryption and secret sharing
Published in Telecommunication systems (01-03-2023)“…The performance of machine learning models largely depends on the amount of data. However, with the improvement of privacy awareness, data sharing has become…”
Get full text
Journal Article -
18
Secure mobile health system supporting search function and decryption verification
Published in Journal of ambient intelligence and humanized computing (01-02-2021)“…In order to protect the privacy of the data, the data owners encrypt their sensitive data before transferring it to cloud servers. This method leads to the…”
Get full text
Journal Article -
19
An efficient certificateless user authentication and key exchange protocol for client-server environment
Published in Journal of ambient intelligence and humanized computing (01-11-2018)“…Identity-based user authentication protocols have been presented to be applicable to resource-constrained devices such as mobile phones. Unfortunately, the…”
Get full text
Journal Article -
20
ASDS: Attribute‐based secure data sharing scheme for reliable cloud environment
Published in Security and privacy (01-03-2019)“…Cloud computing is a new revolution of information technology which provides many benefits to customers such as scalability, on‐demand, 24 × 7 × 365 support,…”
Get full text
Journal Article