Privacy-preserving in smart contracts using blockchain and artificial intelligence for cyber risk measurements (English)
- New search for: Deebak, B D
- New search for: AL-Turjman, Fadi
- New search for: Deebak, B D
- New search for: AL-Turjman, Fadi
-
ISSN:
- Article (Journal) / Electronic Resource
-
Title:Privacy-preserving in smart contracts using blockchain and artificial intelligence for cyber risk measurements
-
Contributors:Deebak, B D ( author ) / AL-Turjman, Fadi ( author )
-
Publisher:
- New search for: Elsevier Ltd
-
Publication date:2021-01-01
-
ISSN:
-
DOI:
-
Type of media:Article (Journal)
-
Type of material:Electronic Resource
-
Language:English
-
Keywords:
-
Source:
Table of contents – Volume 58
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
-
Privacy protection for Wi-Fi location positioning systemsBoutet, Antoine / Cunche, Mathieu et al. | 2020
-
A lightweight and provable secure identity-based generalized proxy signcryption (IBGPS) scheme for Industrial Internet of Things (IIoT)Hussain, Saddam / Ullah, Insaf / Khattak, Hizbullah / Khan, Muhammad Asghar / Chen, Chien-Ming / Kumari, Saru et al. | 2020
-
An image encryption scheme based on double chaotic cyclic shift and Josephus problemWang, Rui / Deng, Guo-Qiang / Duan, Xue-Feng et al. | 2020
-
Two hardware implementations for modular multiplication in the AMNS: Sequential and semi-parallelChaouch, Asma / Didier, Laurent-Stéphane / Dosso, Fangan Yssouf / El Mrabet, Nadia / Bouallegue, Belgacem / Ouni, Bouraoui et al. | 2021
-
SEA-BREW: A scalable Attribute-Based Encryption revocable scheme for low-bitrate IoT wireless networksLa Manna, Michele / Perazzo, Pericle / Dini, Gianluca et al. | 2020
-
Deep belief network-based hybrid model for multimodal biometric system for futuristic security applicationsVijay, M. / Indumathi, G. et al. | 2020
-
Elliptic Curve Cryptography based authentication scheme for Internet of Medical ThingsSowjanya, K. / Dasgupta, Mou / Ray, Sangram et al. | 2021
-
Describing correct UAVs cooperation architectures applied on an anti-terrorism scenarioGassara, Amal / Bouassida Rodriguez, Ismael et al. | 2021
-
Multi-party transaction framework for drone services based on alliance blockchain in smart citiesLv, Lingling / Yang, Zhipeng / Zhang, Lei / Huang, Quanzhen / Tian, Zhihong et al. | 2021
-
Deniable search of encrypted cloud-storage dataChi, Po-Wen / Wang, Ming-Hung et al. | 2021
-
Dynamic 3D scrambled image based RGB image encryption scheme using hyperchaotic system and DNA encodingIqbal, Nadeem / Hanif, Muhammad / Abbas, Sagheer / Khan, Muhammad Adnan / Ul Rehman, Zia et al. | 2021
-
End-to-end secure group communication for the Internet of ThingsLizardo, André / Barbosa, Raul / Neves, Samuel / Correia, Jaime / Araujo, Filipe et al. | 2021
-
Security model for protecting intellectual property of state-of-the-art microfluidic biochipsGountia, Debasis / Roy, Sudip et al. | 2021
-
NEDetector: Automatically extracting cybersecurity neologisms from hacker forumsLi, Ying / Cheng, Jiaxing / Huang, Cheng / Chen, Zhouguo / Niu, Weina et al. | 2021
-
Multi-directional block based PVD and modulus function image steganography to avoid FOBP and IEPSahu, Aditya Kumar / Swain, Gandharba / Sahu, Monalisa / Hemalatha, J. et al. | 2021
-
Multi-view deep learning for zero-day Android malware detectionMillar, Stuart / McLaughlin, Niall / Martinez del Rincon, Jesus / Miller, Paul et al. | 2020
-
Software-Defined Network enabled Vehicle to Vehicle secured data transmission protocol in VANETsAmin, Ruhul / Pali, Isha / Sureshkumar, Venkatasamy et al. | 2020
-
Cryptanalysis and improvement of a two-factor user authentication scheme for smart homeKaur, Damandeep / Kumar, Devender et al. | 2021
-
Blockchain-based searchable encryption with efficient result verification and fair paymentLi, Haiyu / Wang, Tao / Qiao, Zirui / Yang, Bo / Gong, Yueyang / Wang, Jingyi / Qiu, Guoyong et al. | 2021
-
Secure and efficient revocable key-aggregate cryptosystem for multiple non-predefined non-disjoint aggregate setsPareek, Gaurav / B.R., Purushothama et al. | 2021
-
Distributed secret sharing scheme based on the high-dimensional rotation paraboloidQin, Shiyue / Tan, Zhenhua / Zhang, Bin / Zhou, Fucai et al. | 2021
-
Privacy-preserving batch verification signature scheme based on blockchain for Vehicular Ad-Hoc NetworksRen, Yanli / Li, Xiangyu / Sun, Shi-Feng / Yuan, Xingliang / Zhang, Xinpeng et al. | 2020
-
CCA secure and efficient proxy re-encryption scheme without bilinear pairingPrasad, Shilpee / B.R., Purushothama et al. | 2020
-
Exploiting statistical and structural features for the detection of Domain Generation AlgorithmsPatsakis, Constantinos / Casino, Fran et al. | 2020
-
Agent architecture of an intelligent medical system based on federated learning and blockchain technologyPołap, Dawid / Srivastava, Gautam / Yu, Keping et al. | 2021
-
Blockchain-based scheme for the mobile number portabilityShah, Jay / Agarwal, Sarthak / Shukla, Arpit / Tanwar, Sudeep / Tyagi, Sudhanshu / Kumar, Neeraj et al. | 2021
-
Provably secure biometric-based client–server secure communication over unreliable networksSaleem, Muhammad Asad / Islam, SK Hafizul / Ahmed, Shafiq / Mahmood, Khalid / Hussain, Majid et al. | 2021
-
Bi-GISIS KE: Modified key exchange protocol with reusable keys for IoT securitySeyhan, Kübra / Nguyen, Tu N. / Akleylek, Sedat / Cengiz, Korhan / Islam, S.K. Hafızul et al. | 2021
-
Effective charging identity authentication scheme based on fog computing in V2G networksXia, Zhuoqun / Fang, Zhenwei / Gu, Ke / Wang, Jing / Tan, Jingjing / Wang, Guanghui et al. | 2020
-
Simple and scalable blockchain with privacyChan, Wai Kok / Chin, Ji-Jian / Goh, Vik Tor et al. | 2020
-
A novel sophisticated hybrid method for intrusion detection using the artificial immune systemFarzadnia, Ehsan / Shirazi, Hossein / Nowroozi, Alireza et al. | 2020
-
NATICUSdroid: A malware detection framework for Android using native and custom permissionsMathur, Akshay / Podila, Laxmi Mounika / Kulkarni, Keyur / Niyaz, Quamar / Javaid, Ahmad Y. et al. | 2020
-
Blockchain-Enabled healthcare system for detection of diabetesChen, Mengji / Malook, Taj / Rehman, Ateeq Ur / Muhammad, Yar / Alshehri, Mohammad Dahman / Akbar, Aamir / Bilal, Muhammad / Khan, Muazzam A. et al. | 2021
-
Security Scheme Enhancement for Voice over Wireless NetworksHazzaa, Firas / Shabut, Antesar M. / Ali, Nada Hussein M. / Cirstea, Marcian et al. | 2021
-
Robust Lightweight Privacy-Preserving and Session Scheme Interrogation for Fog Computing SystemsDeebak, B D / Al-Turjman, Fadi et al. | 2020
-
A cancelable biometric authentication system based on feature-adaptive random projectionYang, Wencheng / Wang, Song / Shahzad, Muhammad / Zhou, Wei et al. | 2020
-
An optimized robust watermarking technique using CKGSA in frequency domainSingh, Roop / Ashok, Alaknanda et al. | 2020
-
Efficient data confidentiality scheme for 5G wireless NOMA communicationsNoura, Hassan N. / Melki, Reem / Chehab, Ali et al. | 2021
-
Lossless fuzzy extractor enabled secure authentication using low entropy noisy sourcesLai, Yen-Lung / Li, Minyi / Liang, Shiuan-Ni / Jin, Zhe et al. | 2020
-
Detection of malicious Android applications using Ontology-based intelligent model in mobile cloud environmentO.S, Jannath Nisha / S, Mary Saira Bhanu et al. | 2021
-
Multi-level models for data security in networks and in the Internet of thingsLogrippo, Luigi et al. | 2021
-
A blockchain based secure communication framework for community interactionSharma, Rahul / Wazid, Mohammad / Gope, Prosanta et al. | 2021
-
An Efficient Dual-image Reversible Data Hiding Scheme Based on Exploiting Modification DirectionChen, Xiaofeng / Hong, Chaoqun et al. | 2020
-
A lossless self-recovery watermarking scheme with JPEG-LS compressionZhaoning, You / Yan, Liu / Tiegang, Gao et al. | 2020
-
Android botnet detection using machine learning models based on a comprehensive static analysis approachHijawi, Wadi’ / Alqatawna, Ja’far / Al-Zoubi, Ala’ M. / Hassonah, Mohammad A. / Faris, Hossam et al. | 2020
-
Privacy-preserving in smart contracts using blockchain and artificial intelligence for cyber risk measurementsDeebak, B D / AL-Turjman, Fadi et al. | 2021
-
A party-adaptive variant of LowGearLi, Yanbin / Liu, Yu / Dai, Yongheng / Wang, Pengda et al. | 2021
-
Clustering method and symmetric/asymmetric cryptography scheme adapted to securing urban VANET networksAlaya, Bechir / SELLAMI, Lamaa et al. | 2021
-
Preserving authentication and availability security services through Multivariate Statistical Network MonitoringSoufiane, Sail / Magán-Carrión, Roberto / Medina-Bulo, Inmaculada / Bouden, Halima et al. | 2021
-
XGBXSS: An Extreme Gradient Boosting Detection Framework for Cross-Site Scripting Attacks Based on Hybrid Feature Selection Approach and Parameters OptimizationMokbal, Fawaz Mahiuob Mohammed / Dan, Wang / Xiaoxi, Wang / Wenbin, Zhao / Lihua, Fu et al. | 2021
-
An enhanced scalable and secure RFID authentication protocol for WBAN within an IoT environmentIzza, Sarah / Benssalah, Mustapha / Drouiche, Karim et al. | 2020
-
Designated-ciphertext searchable encryptionLiu, Zi-Yuan / Tseng, Yi-Fan / Tso, Raylin / Mambo, Masahiro et al. | 2020
-
ETIP: An Enriched Threat Intelligence Platform for improving OSINT correlation, analysis, visualization and sharing capabilitiesGonzález-Granadillo, Gustavo / Faiella, Mario / Medeiros, Ibéria / Azevedo, Rui / González-Zarzosa, Susana et al. | 2020
-
Adversarial attacks on machine learning cybersecurity defences in Industrial Control SystemsAnthi, Eirini / Williams, Lowri / Rhode, Matilda / Burnap, Pete / Wedgbury, Adam et al. | 2020
-
Evaluating the cyber security readiness of organizations and its influence on performanceHasan, Shaikha / Ali, Mazen / Kurnia, Sherah / Thurasamy, Ramayah et al. | 2021
-
Design of ideal secret sharing based on new results on representable quadripartite matroidsHsu, Chingfang / Harn, Lein / Xia, Zhe / Zhang, Maoyuan / Li, Quanrun et al. | 2020
-
Constructing provable secure broadcast encryption scheme with dealershipAcharya, Kamalesh / Dutta, Ratna et al. | 2020
-
On the transparency order relationships between one Boolean function and its decomposition functionsZhou, Yu / Dong, Xinfeng / Wei, Yongzhuang et al. | 2020
-
A comprehensive review on collision-resistant hash functions on latticesMishra, Nimish / Islam, SK Hafizul / Zeadally, Sherali et al. | 2021
-
On the construction of a post-quantum blockchain for smart cityChen, Jiahui / Gan, Wensheng / Hu, Muchuang / Chen, Chien-Ming et al. | 2021
-
A mutual authentication scheme for establishing secure device-to-device communication sessions in the edge-enabled smart citiesZhang, Yanbin / Cheng, Ke / Khan, Fazlullah / Alturki, Ryan / Khan, Rahim / Rehman, Ateeq Ur et al. | 2020
-
Chaos and compressive sensing based novel image encryption schemeKhan, Jan Sher / Kayhan, Sema Koç et al. | 2020
-
Enhanced (n, n)-threshold QR code secret sharing scheme based on error correction mechanismHuang, Peng-Cheng / Chang, Chin-Chen / Li, Yung-Hui / Liu, Yanjun et al. | 2020
-
Post-quantum secure multi-party private set-intersection in star network topologyDebnath, Sumit Kumar / Choudhury, Tanmay / Kundu, Nibedita / Dey, Kunal et al. | 2020
-
NodeXP: NOde.js server-side JavaScript injection vulnerability DEtection and eXPloitationNtantogian, Christoforos / Bountakas, Panagiotis / Antonaropoulos, Dimitris / Patsakis, Constantinos / Xenakis, Christos et al. | 2021
-
Energy-efficient dynamic homomorphic security scheme for fog computing in IoT networksGupta, Sejal / Garg, Ritu / Gupta, Nitin / Alnumay, Waleed S. / Ghosh, Uttam / Sharma, Pradip Kumar et al. | 2021
-
A secure and efficient group signature scheme based on multivariate public key cryptographyKundu, Nibedita / Debnath, Sumit Kumar / Mishra, Dheerendra et al. | 2021
-
Attack classification of an intrusion detection system using deep learning and hyperparameter optimizationKunang, Yesi Novaria / Nurmaini, Siti / Stiawan, Deris / Suprapto, Bhakti Yudho et al. | 2021
-
Editorial Board| 2021