Photo from wikipedia
Sign Up to like & get
recommendations!
1
Published in 2017 at "International Journal of Information Security"
DOI: 10.1007/s10207-017-0375-z
Abstract: This paper presents AES4SeC, a security scheme fully constructed over cryptographic pairings. The main building blocks of AES4SeC are attribute-based encryption (ABE) and short signatures (SSign), with generalized constructions for the Type 3 pairing. AES4SeC…
read more here.
Keywords:
approach data;
security;
cryptographic approach;
based cryptographic ... See more keywords
Photo from wikipedia
Sign Up to like & get
recommendations!
0
Published in 2021 at "Journal of Ambient Intelligence and Humanized Computing"
DOI: 10.1007/s12652-021-03109-9
Abstract: A field of information security provides an efficiency to manage the records over remote server with proper privacy preserving norms. These kinds of information privacy are required today to maintain ones record into the server…
read more here.
Keywords:
information security;
data security;
security;
blockchain ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2019 at "Cognitive Systems Research"
DOI: 10.1016/j.cogsys.2019.02.008
Abstract: Abstract This article presents new methods of cognitive computational paragigms dedicated to data security solutions. Especially, these paragidms will be presented based on new, combined classes of threshold schemes – names linguistic-biometric threshold schemes. Linguistic,…
read more here.
Keywords:
threshold schemes;
security;
protocols data;
data security ... See more keywords
Photo from wikipedia
Sign Up to like & get
recommendations!
1
Published in 2022 at "Soft matter"
DOI: 10.1039/d2sm00890d
Abstract: Developing advanced materials for highly secure data-encryption is crucial but very challenging, as most data-encryption materials (the message area) are chemically different from the substrates (the background) on which they are being written, leading to…
read more here.
Keywords:
data security;
data encryption;
encryption;
level ... See more keywords
Photo from wikipedia
Sign Up to like & get
recommendations!
1
Published in 2020 at "IEEE Access"
DOI: 10.1109/access.2020.3028686
Abstract: The new generation of wireless body area networks (WBAN) for the internet of things (IoT) is emerging in a fast-paced. Today patients can be tested using remote clinical nanosensors. WBAN involves small interconnected sensors for…
read more here.
Keywords:
body area;
area networks;
data security;
security ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2022 at "IEEE Access"
DOI: 10.1109/access.2022.3144632
Abstract: The world is facing a growth in the amount and variety of data generated by both users and machines. Despite the exponential increases, the tools and technologies developed to manage these data volumes are not…
read more here.
Keywords:
data security;
fragmentation;
big data;
blockchain technology ... See more keywords
Photo from wikipedia
Sign Up to like & get
recommendations!
1
Published in 2022 at "IEEE Access"
DOI: 10.1109/access.2022.3221109
Abstract: With the rapid development of the social economy, the problem of environmental pollution has been widely concerned. The existing environmental monitoring system adopts a hierarchical centralized management structure, which has some problems, such as data…
read more here.
Keywords:
data security;
monitoring data;
security;
monitoring ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2020 at "IEEE Transactions on Computers"
DOI: 10.1109/tc.2019.2963303
Abstract: SQLite, one of the most popular light-weighted database system, has been widely used in various systems. However, the compact design of SQLite did not make enough consideration on user data security. Specifically, anyone who has…
read more here.
Keywords:
sqlite high;
database;
cryptsqlite sqlite;
high data ... See more keywords
Photo from wikipedia
Sign Up to like & get
recommendations!
1
Published in 2022 at "IEEE Transactions on Industrial Informatics"
DOI: 10.1109/tii.2022.3144016
Abstract: Medical data widely exist in the hospital and personal life, usually across institutions and regions. They have essential diagnostic value and therapeutic significance. The disclosure of patient information causes people’s panic, therefore, medical data security…
read more here.
Keywords:
data security;
neural architecture;
architecture search;
medical data ... See more keywords
Photo from wikipedia
Sign Up to like & get
recommendations!
0
Published in 2022 at "ANZ Journal of Surgery"
DOI: 10.1111/ans.17550
Abstract: Instant messaging via WhatsApp is used within hospital teams. Group messaging can lead to efficient and non‐hierarchical communication. Despite being end‐to‐end encrypted, WhatsApp is owned by Facebook, raising concerns regarding data security. The aims of…
read more here.
Keywords:
data security;
security instant;
mobile data;
instant messaging ... See more keywords
Photo from wikipedia
Sign Up to like & get
recommendations!
1
Published in 2017 at "British Medical Journal"
DOI: 10.1136/bmj.j3412
Abstract: Systems to ensure better protection of patients’ data are to be tightened in England, with extra funding to boost cybersecurity, severer punishments for security lapses, and promises of a new system to allow patients to…
read more here.
Keywords:
patient data;
cyberattack;
security;
nhs patient ... See more keywords