Articles with "data security" as a keyword



Photo from wikipedia

A pairing-based cryptographic approach for data security in the cloud

Sign Up to like & get
recommendations!
Published in 2017 at "International Journal of Information Security"

DOI: 10.1007/s10207-017-0375-z

Abstract: This paper presents AES4SeC, a security scheme fully constructed over cryptographic pairings. The main building blocks of AES4SeC are attribute-based encryption (ABE) and short signatures (SSign), with generalized constructions for the Type 3 pairing. AES4SeC… read more here.

Keywords: approach data; security; cryptographic approach; based cryptographic ... See more keywords
Photo from wikipedia

Prediction of data threats over web medium using advanced blockchain based information security with crypto strategies

Sign Up to like & get
recommendations!
Published in 2021 at "Journal of Ambient Intelligence and Humanized Computing"

DOI: 10.1007/s12652-021-03109-9

Abstract: A field of information security provides an efficiency to manage the records over remote server with proper privacy preserving norms. These kinds of information privacy are required today to maintain ones record into the server… read more here.

Keywords: information security; data security; security; blockchain ... See more keywords
Photo by campaign_creators from unsplash

Cognitive and biologically cryptographic protocols for data security

Sign Up to like & get
recommendations!
Published in 2019 at "Cognitive Systems Research"

DOI: 10.1016/j.cogsys.2019.02.008

Abstract: Abstract This article presents new methods of cognitive computational paragigms dedicated to data security solutions. Especially, these paragidms will be presented based on new, combined classes of threshold schemes – names linguistic-biometric threshold schemes. Linguistic,… read more here.

Keywords: threshold schemes; security; protocols data; data security ... See more keywords
Photo from wikipedia

Data storage and encryption with a high security level based on molecular configurational isomers.

Sign Up to like & get
recommendations!
Published in 2022 at "Soft matter"

DOI: 10.1039/d2sm00890d

Abstract: Developing advanced materials for highly secure data-encryption is crucial but very challenging, as most data-encryption materials (the message area) are chemically different from the substrates (the background) on which they are being written, leading to… read more here.

Keywords: data security; data encryption; encryption; level ... See more keywords
Photo from wikipedia

A Lightweight Genetic Based Algorithm for Data Security in Wireless Body Area Networks

Sign Up to like & get
recommendations!
Published in 2020 at "IEEE Access"

DOI: 10.1109/access.2020.3028686

Abstract: The new generation of wireless body area networks (WBAN) for the internet of things (IoT) is emerging in a fast-paced. Today patients can be tested using remote clinical nanosensors. WBAN involves small interconnected sensors for… read more here.

Keywords: body area; area networks; data security; security ... See more keywords
Photo by campaign_creators from unsplash

Towards Big Data Security Framework by Leveraging Fragmentation and Blockchain Technology

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Access"

DOI: 10.1109/access.2022.3144632

Abstract: The world is facing a growth in the amount and variety of data generated by both users and machines. Despite the exponential increases, the tools and technologies developed to manage these data volumes are not… read more here.

Keywords: data security; fragmentation; big data; blockchain technology ... See more keywords
Photo from wikipedia

Research on Data Security Model of Environmental Monitoring Based on Blockchain

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Access"

DOI: 10.1109/access.2022.3221109

Abstract: With the rapid development of the social economy, the problem of environmental pollution has been widely concerned. The existing environmental monitoring system adopts a hierarchical centralized management structure, which has some problems, such as data… read more here.

Keywords: data security; monitoring data; security; monitoring ... See more keywords
Photo by martindorsch from unsplash

CryptSQLite: SQLite With High Data Security

Sign Up to like & get
recommendations!
Published in 2020 at "IEEE Transactions on Computers"

DOI: 10.1109/tc.2019.2963303

Abstract: SQLite, one of the most popular light-weighted database system, has been widely used in various systems. However, the compact design of SQLite did not make enough consideration on user data security. Specifically, anyone who has… read more here.

Keywords: sqlite high; database; cryptsqlite sqlite; high data ... See more keywords
Photo from wikipedia

Federated Neural Architecture Search for Medical Data Security

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Transactions on Industrial Informatics"

DOI: 10.1109/tii.2022.3144016

Abstract: Medical data widely exist in the hospital and personal life, usually across institutions and regions. They have essential diagnostic value and therapeutic significance. The disclosure of patient information causes people’s panic, therefore, medical data security… read more here.

Keywords: data security; neural architecture; architecture search; medical data ... See more keywords
Photo from wikipedia

Mobile data security: instant messaging in orthopaedics

Sign Up to like & get
recommendations!
Published in 2022 at "ANZ Journal of Surgery"

DOI: 10.1111/ans.17550

Abstract: Instant messaging via WhatsApp is used within hospital teams. Group messaging can lead to efficient and non‐hierarchical communication. Despite being end‐to‐end encrypted, WhatsApp is owned by Facebook, raising concerns regarding data security. The aims of… read more here.

Keywords: data security; security instant; mobile data; instant messaging ... See more keywords
Photo from wikipedia

NHS patient data security is to be tightened after cyberattack

Sign Up to like & get
recommendations!
Published in 2017 at "British Medical Journal"

DOI: 10.1136/bmj.j3412

Abstract: Systems to ensure better protection of patients’ data are to be tightened in England, with extra funding to boost cybersecurity, severer punishments for security lapses, and promises of a new system to allow patients to… read more here.

Keywords: patient data; cyberattack; security; nhs patient ... See more keywords