scroll to top
0
Your source for trusted research content

EBSCO Auth Banner

Let's find your institution. Click here.

Advanced Search Results For "Alrawais, Arwa"

1 - 10 of 29 results for
 "Alrawais, Arwa"
Results per page:

An Efficient Blockchain-Based Bidirectional Friends Matching Scheme in Social Networks

Publication Type: Academic Journal

Source(s): IEEE Access, Vol 8, Pp 150902-150913 (2020)

Abstract: In social networks, the personal attributes or hobbies of the users are exposed to the server to establish the relationships. Service providers may store these information for commercial purpose or statistical analysis. Furthermore, the server may expo...

Intelligent techniques for deception detection: a survey and critical study.

Publication Type: Academic Journal

Source(s): Soft Computing - A Fusion of Foundations, Methodologies & Applications; Apr2023, Vol. 27 Issue 7, p3581-3600, 20p

Abstract: Copyright of Soft Computing - A Fusion of Foundations, Methodologies & Applications is the property of Springer Nature and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written...

Privacy-preserving combinatorial auction without an auctioneer

Publication Type: Academic Journal

Source(s): EURASIP Journal on Wireless Communications and Networking, Vol 2018, Iss 1, Pp 1-8 (2018)

Abstract: Abstract Combinatorial auctions are employed into many applications such as spectrum auctions held by the Federal Communications Commission (FCC). A crucial problem in such auctions is the lack of secure and efficiency mechanism to protect the privacy ...

An Attribute-Based Encryption Scheme to Secure Fog Communications

Publication Type: Academic Journal

Source(s): IEEE Access, Vol 5, Pp 9131-9138 (2017)

Abstract: Fog computing is deemed as a highly virtualized paradigm that can enable computing at the Internet of Things devices, residing in the edge of the network, for the purpose of delivering services and applications more efficiently and effectively. Since f...

A Secure and Practical Authentication Scheme Using Personal Devices

Publication Type: Academic Journal

Source(s): IEEE Access, Vol 5, Pp 11677-11687 (2017)

Abstract: Authentication plays a critical role in securing any online banking system, and many banks and various services have long relied on username/password combos to verify users. Memorizing usernames and passwords for a lot of accounts becomes a cumbersome ...

Privacy-Preserving Techniques in Social Distancing Applications: A Comprehensive Survey.

Publication Type: Academic Journal

Source(s): Journal of Advanced Computational Intelligence & Intelligent Informatics; May2022, Vol. 26 Issue 3, p325-341, 17p

Abstract: Copyright of Journal of Advanced Computational Intelligence & Intelligent Informatics is the property of Fuji Technology Press Ltd. and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's ex...

A Secure and Scalable Data Communication Scheme in Smart Grids

Publication Type: Academic Journal

Source(s): Wireless Communications and Mobile Computing, Vol 2018 (2018)

Abstract: The concept of smart grid gained tremendous attention among researchers and utility providers in recent years. How to establish a secure communication among smart meters, utility companies, and the service providers is a challenging issue. In this pape...

QuickCash: Secure Transfer Payment Systems

Publication Type: Academic Journal

Source(s): Sensors, Vol 17, Iss 6, p 1376 (2017)

Abstract: Payment systems play a significant role in our daily lives. They are an important driver of economic activities and a vital part of the banking infrastructure of any country. Several current payment systems focus on security and reliability but pay les...

ADGAN: Protect Your Location Privacy in Camera Data of Auto-Driving Vehicles.

Publication Type: Academic Journal

Source(s): IEEE Transactions on Industrial Informatics; Sep2021, Vol. 17 Issue 9, p6200-6210, 11p

Abstract: Copyright of IEEE Transactions on Industrial Informatics is the property of IEEE and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print,...

SecureGuard: A Certificate Validation System in Public Key Infrastructure.

Publication Type: Academic Journal

Source(s): IEEE Transactions on Vehicular Technology; Jun2018, Vol. 67 Issue 6, p5399-5408, 10p

Abstract: Copyright of IEEE Transactions on Vehicular Technology is the property of IEEE and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, d...

sponsored