Showing 1 - 19 results of 19 for search '"privacy"', query time: 0.07s Refine Results
  1. 1
  2. 2
  3. 3
  4. 4
  5. 5

    L-CPPA: Lattice-based conditional privacy-preserving authentication scheme for fog computing with 5G-enabled vehicular system. by Abdulwahab Ali Almazroi, Mohammed A Alqarni, Mahmood A Al-Shareeda, Selvakumar Manickam

    Published 2023-01-01
    “…Such concerns are optimal targets for conditional privacy-preserving authentication (CPPA) methods. …”
    Get full text
    Article
  6. 6
  7. 7
  8. 8
  9. 9
  10. 10
  11. 11
  12. 12
  13. 13

    Efficient Authentication Scheme for 5G-Enabled Vehicular Networks Using Fog Computing by Zeyad Ghaleb Al-Mekhlafi, Mahmood A. Al-Shareeda, Selvakumar Manickam, Badiea Abdulkarem Mohammed, Abdulrahman Alreshidi, Meshari Alazmi, Jalawi Sulaiman Alshudukhi, Mohammad Alsaffar, Taha H. Rassem

    Published 2023-03-01
    “…Several researchers have proposed secure authentication techniques for addressing privacy and security concerns in the fifth-generation (5G)-enabled vehicle networks. …”
    Get full text
    Article
  14. 14

    Comparison of ML/DL Approaches for Detecting DDoS Attacks in SDN by Tariq Emad Ali, Yung-Wey Chong, Selvakumar Manickam

    Published 2023-02-01
    “…Software-defined networking (SDN) presents novel security and privacy risks, including distributed denial-of-service (DDoS) attacks. …”
    Get full text
    Article
  15. 15

    Secured‐KDS: Secret key distribution and authentication scheme for resource‐constrained devices by Selvakumar Manickam, Shafiq Ul Rehman

    Published 2023-01-01
    “…IoT devices often do not enforce proper security measures; this raises serious privacy and security concerns. One of the big issues in securing IoT communications is that traditional cryptographical protocols incur high computational costs and are not suitable for resource‐constrained devices. …”
    Get full text
    Article
  16. 16

    A Systematic Literature Review on Security of Vehicular Ad-Hoc Network (VANET) Based on VEINS Framework by Mahmood A. Al-Shareeda, Selvakumar Manickam

    Published 2023-01-01
    “…The third class comprises the requirements that satisfy privacy, authentication, trust management, reliability, and revocation of the VANET security-based VEINS framework. …”
    Get full text
    Article
  17. 17

    Unveiling the Metaverse: Exploring Emerging Trends, Multifaceted Perspectives, and Future Challenges by Mueen Uddin, Selvakumar Manickam, Hidayat Ullah, Muath Obaidat, Abdulhalim Dandoush

    Published 2023-01-01
    “…Nevertheless, it confronts obstacles, including privacy, security, equitable access, and ethical concerns, necessitating the construction of robust legal and ethical frameworks for the common good. …”
    Get full text
    Article
  18. 18

    Majority Voting Ensemble Classifier for Detecting Keylogging Attack on Internet of Things by Yahya Alhaj Maz, Mohammed Anbar, Selvakumar Manickam, Shaza Dawood Ahmed Rihan, Basim Ahmad Alabsi, Osama M. Dorgham

    Published 2024-01-01
    “…Regarding IoT, intrusions can result in severe problems, including service disruption, data theft, privacy violations, and even bodily injury. One of the intrusion attacks is a keylogging attack, sometimes referred to as keystroke logging or keyboard capture, which is a type of cyberattack in which the attacker secretly observes and records keystrokes made on a device’s keyboard. …”
    Get full text
    Article
  19. 19

    IoT empowered smart cybersecurity framework for intrusion detection in internet of drones by Syeda Nazia Ashraf, Selvakumar Manickam, Syed Saood Zia, Abdul Ahad Abro, Muath Obaidat, Mueen Uddin, Maha Abdelhaq, Raed Alsaqour

    Published 2023-10-01
    “…The main objective of this study is to examine the latest privacy and security challenges impacting the network of drones (NoD). …”
    Get full text
    Article