ScienceGate
Advanced Search
Author Search
Journal Finder
Blog
Sign in / Sign up
ScienceGate
Search
Author Search
Journal Finder
Blog
Sign in / Sign up
Secure provenance-based communication using visual encryption
International Journal of Innovative Computing and Applications
◽
10.1504/ijica.2019.103394
◽
2019
◽
Vol 10
(3/4)
◽
pp. 194
Author(s):
Kukatlapalli Pradeep Kumar
◽
Ravindranath C. Cherukuri
Keyword(s):
Secure Provenance
Download Full-text
Related Documents
Cited By
References
Order preserving secure provenance scheme for distributed networks
Computers & Security
◽
10.1016/j.cose.2018.12.008
◽
2019
◽
Vol 82
◽
pp. 99-117
Author(s):
Idrees Ahmed
◽
Abid Khan
◽
Mansoor Ahmed
◽
Saif ur Rehman
Keyword(s):
Distributed Networks
◽
Secure Provenance
Download Full-text
Scrybe: A Second-Generation Blockchain Technology with Lightweight Mining for Secure Provenance and Related Applications
Advances in Information Security - Blockchain Cybersecurity, Trust and Privacy
◽
10.1007/978-3-030-38181-3_4
◽
2020
◽
pp. 51-67
◽
Cited By ~ 2
Author(s):
Carl Worley
◽
Lu Yu
◽
Richard Brooks
◽
Jon Oakley
◽
Anthony Skjellum
◽
...
Keyword(s):
Second Generation
◽
Blockchain Technology
◽
Secure Provenance
Download Full-text
A Secure Provenance Scheme for Detecting Consecutive Colluding Users in Distributed Networks
International Journal of Parallel Programming
◽
10.1007/s10766-018-0601-y
◽
2018
◽
Vol 48
(2)
◽
pp. 344-366
◽
Cited By ~ 1
Author(s):
Idrees Ahmed
◽
Abid Khan
◽
Adeel Anjum
◽
Mansoor Ahmed
◽
Muhammad Asif Habib
Keyword(s):
Distributed Networks
◽
Secure Provenance
Download Full-text
Secure provenance in Wireless Sensor Networks - a survey of provenance schemes
2017 International Conference on Communication, Computing and Digital Systems (C-CODE)
◽
10.1109/c-code.2017.7918893
◽
2017
◽
Author(s):
Khizar Hameed
◽
Junaid Haseeb
◽
Muhammad Tayyab
◽
Muhammad Junaid
◽
Talal Bin Maqsood
◽
...
Keyword(s):
Wireless Sensor Networks
◽
Sensor Networks
◽
Wireless Sensor
◽
Secure Provenance
Download Full-text
Secure provenance using an authenticated data structure approach
Computers & Security
◽
10.1016/j.cose.2017.10.005
◽
2018
◽
Vol 73
◽
pp. 34-56
◽
Cited By ~ 5
Author(s):
Fuzel Jamil
◽
Abid Khan
◽
Adeel Anjum
◽
Mansoor Ahmed
◽
Farhana Jabeen
◽
...
Keyword(s):
Data Structure
◽
Structure Approach
◽
Secure Provenance
Download Full-text
Introducing secure provenance
Proceedings of the 2007 ACM workshop on Storage security and survivability - StorageSS '07
◽
10.1145/1314313.1314318
◽
2007
◽
Cited By ~ 60
Author(s):
Ragib Hasan
◽
Radu Sion
◽
Marianne Winslett
Keyword(s):
Secure Provenance
Download Full-text
Introducing Secure Provenance in IoT: Requirements and Challenges
2016 International Workshop on Secure Internet of Things (SIoT)
◽
10.1109/siot.2016.011
◽
2016
◽
Cited By ~ 6
Author(s):
Sabah Suhail
◽
Choon Seong Hong
◽
Zuhaib Uddin Ahmad
◽
Faheem Zafar
◽
Abid Khan
Keyword(s):
Secure Provenance
Download Full-text
Aggregated Signatures for Chaining: A Secure Provenance Scheme
2016 IEEE Trustcom/BigDataSE/ISPA
◽
10.1109/trustcom.2016.0307
◽
2016
◽
Author(s):
Idrees Ahmed
◽
Abid Khan
◽
Muhammad Saleem Khan
◽
Mansoor Ahmed
Keyword(s):
Secure Provenance
Download Full-text
A Lightweight Secure Provenance Scheme for Wireless Sensor Networks
2012 IEEE 18th International Conference on Parallel and Distributed Systems
◽
10.1109/icpads.2012.24
◽
2012
◽
Cited By ~ 23
Author(s):
Salmin Sultana
◽
Gabriel Ghinita
◽
Elisa Bertino
◽
Mohamed Shehab
Keyword(s):
Wireless Sensor Networks
◽
Sensor Networks
◽
Wireless Sensor
◽
Secure Provenance
Download Full-text
SCRaaPS: X.509 Certificate Revocation Using the Blockchain-based Scrybe Secure Provenance System
2018 13th International Conference on Malicious and Unwanted Software (MALWARE)
◽
10.1109/malware.2018.8659364
◽
2018
◽
Cited By ~ 1
Author(s):
Sai Medury
◽
Anthony Skjellum
◽
Richard R. Brooks
◽
Lu Yu
Keyword(s):
Certificate Revocation
◽
Secure Provenance
Download Full-text
Sign in / Sign up
Close
Export Citation Format
Close
Share Document
Close