- Privacy-Preserving Technologies in Data
- Cryptography and Data Security
- Mobile Ad Hoc Networks
- Security in Wireless Sensor Networks
- Cooperative Communication and Network Coding
- Opportunistic and Delay-Tolerant Networks
- Data Mining Algorithms and Applications
- Energy Efficient Wireless Sensor Networks
- Network Security and Intrusion Detection
- Smart Grid Security and Resilience
- IoT and Edge/Fog Computing
- Privacy, Security, and Data Protection
- Advanced Steganography and Watermarking Techniques
- Advanced Malware Detection Techniques
- Internet Traffic Analysis and Secure E-voting
- Advanced Authentication Protocols Security
- Complexity and Algorithms in Graphs
- Wireless Networks and Protocols
- Caching and Content Delivery
- Blockchain Technology Applications and Security
- Power System Optimization and Stability
- Cloud Data Security Solutions
- Internet of Things and AI
- Spam and Phishing Detection
- IoT-based Smart Home Systems
Universitas 'Aisyiyah Yogyakarta
2025
Murdoch University
2021-2024
RMIT University
2020
Effat University
2014-2019
Charles Sturt University
2013-2015
Victoria University
2008-2013
King Fahd University of Petroleum and Minerals
2006-2007
In this paper we present a solution to one of the location-based query problems. This problem is defined as follows: (i) user wants database location data, known Points Of Interest (POIs), and does not want reveal his/her server due privacy concerns; (ii) owner that is, server, simply distribute its data all users. The desires have some control over since asset. We propose major enhancement upon previous solutions by introducing two stage approach, where first step based on Oblivious...
Private Information Retrieval (PIR) allows a user to retrieve the ith bit of an n-bit database without revealing server value i. In this paper, we present PIR protocol with communication complexity O(γ logn) bits, where -y is ciphertext size. Furthermore, extend private block retrieval (PBR) protocol, natural and more practical extension in which retrieves instead retrieving single bit. Our protocols are built on state-of-the-art fully homomorphic encryption (FHE) techniques provide privacy...
One of the common problems that occurs in Indonesia regarding conflict management Taekwondo, is leadership Taekwondo organizations. In addition, general occur include educational problems, such as limited access to education, inequality, teacher quality, and curriculum considered irrelevant. Social can also trigger conflict, power struggles political economic contexts. a serious concern, with number social conflicts tending increase from year year. Therefore, needs pay attention various...
Abstract Cloud computing has emerged as an efficient distribution platform in modern distributed offering scalability and flexibility. Task scheduling is considered one of the main crucial aspects cloud computing. The primary purpose task mechanism to reduce cost makespan determine which virtual machine (VM) needs be selected execute task. It widely acknowledged a nondeterministic polynomial-time complete problem, necessitating development solution. This paper presents innovative approach...
The recent mass production and usage of the Internet Things (IoT) have posed serious concerns due to unavoidable security complications. firmware IoT systems is a critical component security. Although multiple organizations released guidelines, few vendors are following these guidelines properly, either lack accountability or availability appropriate resources. Some tools for this purpose can use static, dynamic, fuzzing techniques test firmware, which may result in false positives failure...
Collaborative Intrusion Detection Systems are considered an effective defense mechanism for large, intricate, and multilayered Industrial Internet of Things against many cyberattacks. However, while a System successfully detects prevents various attacks, it is possible that inside attacker performs malicious act compromises node. A compromised node can inflict considerable damage on the whole collaborative network. For instance, when gives false alert attack, other nodes will unnecessarily...
The dining sector in developing countries faces numerous challenges, including inefficiencies order handling, resource management, and ensuring food quality customer privacy. Traditional methods often lead to delays, errors, dissatisfaction. This paper proposes a quick-witted, intelligent order-handling system utilizing the Internet of Things (IoT) address these challenges enhance overall experience. We present comprehensive approach implementing an IoT-based automated tailored restaurants'...
Concealing a message and ensuring its security is inevitable in data transmission. Among various concepts, one approach steganography that encodes secret indiscernible way. In this paper, we present an audio steganographic technique propose novel to hide the least significant bit (LSB) of stereo-audio samples with CD-quality. Here, on basis stego-key parity, bits are encoded into cover samples. terms imperceptibility, method improvement LSB for hiding information audio.
Network traffic classification (NTC) has attracted considerable attention in recent years. The importance of stems from the fact that data modern networks is extremely complex and ever-evolving different aspects, e.g. volume, velocity variety. inherent security requirements Internet-based applications also highlights further role classification. Gaining clear insights into network for performance evaluation planning purposes, behavior analysis, management not a trivial task. Fortunately, NTC...
In this paper we propose a new method of improving the performance dynamic source routing (DSR) protocol. DSR, as well other on-demand protocols, every established path is considered temporary to reflect mobility effect, therefore, once established, it associated with an expiration time. After that time deleted from route cache nodes. practice nodes are not equal all and treat paths differently according their stationary, rather than deleting them after improve performance. By simulation...
The electronic health record (eHR) system has recently been considered one of the biggest advancements in healthcare services. A personally controlled (PCEHR) is proposed by Australian government to make more agile, secure, and sustainable. Although PCEHR claims records can be patients, professionals database/system operators may assist disclosing patients’ eHRs for retaliation or other ill purposes. As conventional methods preserving privacy solely trust operators, these data are vulnerable...
Wireless sensor networks (WSNs) are prone to vulnerabilities due their resource constraints and deployment in remote unattended areas. A node exhibits anomaly behaviour its dying energy level or being compromised by the intruders. The showing anomalous behaviours a leader (LN) of cluster/group multifolds vulnerability problem. To identify nodes WSNs, this paper presents model, which uses Voronoi diagram based network architecture. architecture, deploys mobile data collectors (MDCs), ensures...
Homomorphic encryption system (HES) schemes are anticipated to play a significant role in cloud-based applications. Moving storage and analytic services securely two of the most important advantages HES. Several HES have been recently proposed. However, majority them either limited capabilities or impractical real-world Various provide ability perform computations for statistical analysis (e.g. average, mean variance) on encrypted data. Domingo-Ferrer is one scheme that has privacy...
Recently, Khan et al. [An online-offline certificateless signature scheme for internet of health things,” Journal Healthcare Engineering, vol. 2020] presented a new offline/online Int... | Find, read and cite all the research you need on Tech Science Press
Agriculture faces several uncertain problems in terms of making the best use its natural resources. As a result, and light growing threat changing weather conditions, we must closely track local soil conditions meteorological data to expedite adoption culture-friendly decisions. In Internet Things (IoT) era, deploying Wireless Sensor Networks (WSN) as low-cost remote monitoring management system for these types features is viable choice. However, WSN hampered by motes’ insufficient energy...