Blockchain technology for cloud storage: A systematic literature review

P Sharma, R Jindal, MD Borah - ACM Computing Surveys (CSUR), 2020 - dl.acm.org
The demand for Blockchain innovation and the significance of its application has inspired
ever-progressing exploration in various scientific and practical areas. Even though it is still in …

A comprehensive review on image encryption techniques

M Kaur, V Kumar - Archives of Computational Methods in Engineering, 2020 - Springer
Image encryption techniques play a significant role in multimedia applications to secure and
authenticate digital images. This paper presents a comprehensive study of various image …

A survey on FinTech

K Gai, M Qiu, X Sun - Journal of Network and Computer Applications, 2018 - Elsevier
As a new term in the financial industry, FinTech has become a popular term that describes
novel technologies adopted by the financial service institutions. This term covers a large …

A survey of distributed denial-of-service attack, prevention, and mitigation techniques

T Mahjabin, Y Xiao, G Sun… - International Journal of …, 2017 - journals.sagepub.com
Distributed denial-of-service is one kind of the most highlighted and most important attacks
of today's cyberworld. With simple but extremely powerful attack mechanisms, it introduces …

A robust ECC-based provable secure authentication protocol with privacy preserving for industrial Internet of Things

X Li, J Niu, MZA Bhuiyan, F Wu… - IEEE Transactions …, 2017 - ieeexplore.ieee.org
Wireless sensor networks (WSNs) play an important role in the industrial Internet of Things
(IIoT) and have been widely used in many industrial fields to gather data of monitoring area …

A survey on energy internet: Architecture, approach, and emerging technologies

K Wang, J Yu, Y Yu, Y Qian, D Zeng, S Guo… - IEEE systems …, 2017 - ieeexplore.ieee.org
Energy crisis and carbon emission have become two seriously concerned issues
universally. As a feasible solution, Energy Internet (EI) has aroused global concern once …

LSH-aware multitype health data prediction with privacy preservation in edge environment

L Kong, L Wang, W Gong, C Yan, Y Duan, L Qi - World Wide Web, 2022 - Springer
With the increasing development of electronic technology, traditional paper-driven medical
systems have been converting to efficient electronic records that can be easily checked and …

Security in Internet of Things: issues, challenges, taxonomy, and architecture

V Adat, BB Gupta - Telecommunication Systems, 2018 - Springer
Internet technology is very pervasive today. The number of devices connected to the
Internet, those with a digital identity, is increasing day by day. With the developments in the …

A three-factor anonymous authentication scheme for wireless sensor networks in internet of things environments

X Li, J Niu, S Kumari, F Wu, AK Sangaiah… - Journal of Network and …, 2018 - Elsevier
Abstract Internet of Things (IoT) is an emerging technology, which makes the remote sensing
and control across heterogeneous network a reality, and has good prospects in industrial …

Edge computing and sensor-cloud: Overview, solutions, and directions

T Wang, Y Liang, X Shen, X Zheng, A Mahmood… - ACM Computing …, 2023 - dl.acm.org
Sensor-cloud originates from extensive recent applications of wireless sensor networks and
cloud computing. To draw a roadmap of the current research activities of the sensor-cloud …