Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleJanuary 2025
Remote secure object authentication: Secure sketches, fuzzy extractors, and security protocols
AbstractCoating objects with microscopic droplets of liquid crystals makes it possible to identify and authenticate objects as if they had biometric-like features: this is extremely valuable as an anti-counterfeiting measure. How to extract features from ...
- research-articleOctober 2024
Secretive interaction
AbstractWe study the behaviour of n players engaged in a conversation, each attempting to predict the behaviour of the others. We prove that, under a certain notion of interaction, it is possible to learn all other players, but, generally, not without ...
- research-articleJuly 2024
Secrecy of Molecular Communication in Presence of Radiation Absorption
Wireless Personal Communications: An International Journal (WPCO), Volume 137, Issue 1Pages 133–152https://doi.org/10.1007/s11277-024-11370-2AbstractUltra high user density is one of the key requirements in 6G and beyond. Also, in future, THz based communication system and Molecular Communication (MC) will coexist. In such coexist scenarios, Electromagnetic (EM) radiation and in subsequent ...
- research-articleJune 2024
Secrecy design in full-duplex multi-user MIMO wireless networks with untrusted non-linear energy harvesting
AbstractIn this paper, we consider a secure full-duplex (FD) multi-user multiple-input multiple-output (MU-MIMO) network where an FD base station simultaneously communicates with users and transfers energy for untrusted energy harvesting (EH) devices. ...
- rapid-communicationSeptember 2023
Optimal signal design for coherent detection of binary signals in Gaussian noise under power and secrecy constraints
AbstractThe problem of optimal signal design for coherent detection of binary signals in Gaussian noise is revisited under power and secrecy constraints. In particular, the aim is to select the binary transmitted signals in an optimal manner ...
-
- research-articleMarch 2023
Secrecy aware key management scheme for Internet of Healthcare Things
The Journal of Supercomputing (JSCO), Volume 79, Issue 11Pages 12492–12522https://doi.org/10.1007/s11227-023-05144-zAbstractThe Internet of Things (IoT) is becoming an essential aspect of digital healthcare information; the goal is to monitor various health parameters regularly to make healthcare management more efficient and convenient. Gateway devices can broadcast/...
- research-articleSeptember 2021
Performance analysis of congestion-aware secure broadcast channels
EURASIP Journal on Wireless Communications and Networking (JWCN), Volume 2021, Issue 1https://doi.org/10.1186/s13638-021-02046-7AbstractCongestion-aware scheduling in case of downlink cellular communication has ignored the distribution of diverse content to different clients with heterogeneous secrecy requirements. Other possible application areas that encounter the preceding ...
- research-articleSeptember 2021
Secrecy Analysis of Overlay Mechanism in Radio Frequency Energy Harvesting Networks with Jamming under Nakagami-m fading
Wireless Personal Communications: An International Journal (WPCO), Volume 120, Issue 1Pages 447–479https://doi.org/10.1007/s11277-021-08468-2AbstractOverlay mechanism offers secondary users (SUs) chances to access licensed spectrum of primary users (PUs) to improve spectrum utilization efficiency. However, these chances impose serious security challenges when wire-tappers emulate legal users (...
- articleJuly 2021
George the Chemist: A Dilemma About Sabotage, Disaster Prevention, and Justification of Duplicity
International Journal of Technoethics (IJT-IGI), Volume 12, Issue 2Pages 48–59https://doi.org/10.4018/IJT.2021070104The present paper is an attempt to answer Bernard Williams' classical dilemma of George the chemist, who is asked by a senior colleague to partake in a CBW research program. Both George and the colleague oppose the research, and George is advised not ...
- research-articleMarch 2021
Secrecy and performance models for query processing on outsourced graph data
Distributed and Parallel Databases (DAPD), Volume 39, Issue 1Pages 35–77https://doi.org/10.1007/s10619-020-07284-0AbstractDatabase outsourcing is a challenge concerning data secrecy. Even if an adversary, including the service provider, accesses the data, she should not be able to learn any information from the accessed data. In this paper, we address this problem ...
- research-articleJanuary 2020
Security Performance of Underlay Cognitive Relaying Networks with Energy Harvesting
Wireless Personal Communications: An International Journal (WPCO), Volume 110, Issue 2Pages 829–846https://doi.org/10.1007/s11277-019-06758-4AbstractAn unlicensed relay is located between an unlicensed sender and an unlicensed recipient for securing the sender’s message against a wire-tapper in underlay cognitive networks when the sender–recipient channel is inaccessible. The energy in the ...
- articleNovember 2018
Medical image region based watermarking for secured telemedicine
Multimedia Tools and Applications (MTAA), Volume 77, Issue 21Pages 28249–28280Exchange of Medical images over public networks entail a methodology to offer secrecy for the image along with confirmation for image integrity. In this paper, a region-based Firefly optimized algorithm and hybridization of DWT and Schur transforms in ...
- articleApril 2018
An Improvised Framework for Privacy Preservation in IoT
International Journal of Information Security and Privacy (IJISP-IGI), Volume 12, Issue 2Pages 46–63https://doi.org/10.4018/IJISP.2018040104Data privacy is now-a-days a special issue in era of Internet of Things because of the big data stored and transmitted by the public/private devices. Different types and levels of privacy can be provided at different layers of IoT architecture, also ...
- ArticleNovember 2017
Single-Shot Secure Quantum Network Coding for General Multiple Unicast Network with Free Public Communication
AbstractBased on a secure classical network code, we propose a general method for constructing a secure quantum network code in the multiple unicast setting under restricted eavesdropper’s power. This protocol certainly transmits quantum states when there ...
- research-articleJanuary 2017
Contemporary IT Security for Military Online Collaboration Platforms
ICDCN '17: Proceedings of the 18th International Conference on Distributed Computing and NetworkingArticle No.: 33, Pages 1–10https://doi.org/10.1145/3007748.3007754Persistent armed conflicts with volatile intensities around Europe and resultant incidents directly on the old continent prompt the European governments and their general staffs to hold militiamen as reserve forces ready for emergency cases. These semi-...
- research-articleFebruary 2016
The nature of government tweets for conveying a message to the public
Proceedings of the Association for Information Science and Technology (PRA2), Volume 52, Issue 1Pages 1–5https://doi.org/10.1002/pra2.2015.1450520100131ABSTRACTGovernments wish to keep certain types of information concealed from the public due to a variety of different reasons. Government agencies that protect secrecy often have a difficult time connecting to the public (WGPC, 2014). Secretive, or ...
- research-articleAugust 2015
Deciding Resilient Criminal Networks
ASONAM '15: Proceedings of the 2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining 2015Pages 1368–1372https://doi.org/10.1145/2808797.2808857Criminal networks mostly shape themselves in order to maximize their gains but also hide their activities from prosecution. They also need of trust within network members and cliques. They also seek for immunity and protection from breaches and may not ...
- research-articleFebruary 2015
Turning foes to allies in cognitive radio networks
We study a class of problems in Cognitive Radio Networks where multiple half-duplex unlicensed (secondary) users can eavesdrop and jam the communications of licensed (primary) users unless granted access to communicate over the same spectrum band. The ...
- research-articleDecember 2014
Bounding messages for free in security protocols - extension to various security properties
Information and Computation (ICOM), Volume 239, Issue CPages 182–215https://doi.org/10.1016/j.ic.2014.09.003While the verification of security protocols has been proved to be undecidable in general, several approaches use simplifying hypotheses in order to obtain decidability for interesting subclasses. Amongst the most common is type abstraction, i.e. ...
- research-articleOctober 2014
Information asymmetry and power in a surveillance society
Information and Organization (INOR), Volume 24, Issue 4Pages 214–235https://doi.org/10.1016/j.infoandorg.2014.09.001This paper fuses Lukes' (1974) three-dimensional view of power with the economic concept of informational asymmetry to explicate how access to information is organized and how power relationships arise from this organization. We argue that many observed ...