Articles with "data security" as a keyword



A pairing-based cryptographic approach for data security in the cloud

Sign Up to like & get
recommendations!
Published in 2017 at "International Journal of Information Security"

DOI: 10.1007/s10207-017-0375-z

Abstract: This paper presents AES4SeC, a security scheme fully constructed over cryptographic pairings. The main building blocks of AES4SeC are attribute-based encryption (ABE) and short signatures (SSign), with generalized constructions for the Type 3 pairing. AES4SeC… read more here.

Keywords: approach data; security; cryptographic approach; based cryptographic ... See more keywords
Photo from wikipedia

Prediction of data threats over web medium using advanced blockchain based information security with crypto strategies

Sign Up to like & get
recommendations!
Published in 2021 at "Journal of Ambient Intelligence and Humanized Computing"

DOI: 10.1007/s12652-021-03109-9

Abstract: A field of information security provides an efficiency to manage the records over remote server with proper privacy preserving norms. These kinds of information privacy are required today to maintain ones record into the server… read more here.

Keywords: information security; data security; security; blockchain ... See more keywords

Cognitive and biologically cryptographic protocols for data security

Sign Up to like & get
recommendations!
Published in 2019 at "Cognitive Systems Research"

DOI: 10.1016/j.cogsys.2019.02.008

Abstract: Abstract This article presents new methods of cognitive computational paragigms dedicated to data security solutions. Especially, these paragidms will be presented based on new, combined classes of threshold schemes – names linguistic-biometric threshold schemes. Linguistic,… read more here.

Keywords: threshold schemes; security; protocols data; data security ... See more keywords

Data storage and encryption with a high security level based on molecular configurational isomers.

Sign Up to like & get
recommendations!
Published in 2022 at "Soft matter"

DOI: 10.1039/d2sm00890d

Abstract: Developing advanced materials for highly secure data-encryption is crucial but very challenging, as most data-encryption materials (the message area) are chemically different from the substrates (the background) on which they are being written, leading to… read more here.

Keywords: data security; data encryption; encryption; level ... See more keywords

Adoption of coping behaviours: public response to data security risks of intelligent connected vehicles in China

Sign Up to like & get
recommendations!
Published in 2025 at "Journal of Risk Research"

DOI: 10.1080/13669877.2025.2485038

Abstract: Abstract With the rapid development of the global digital economy and the expanding ecosystem of the Internet of Vehicles (IoV), the risks associated with connected vehicles, such as data security, software vulnerabilities, communication hijacking, and… read more here.

Keywords: connected vehicles; data security; response; coping behaviours ... See more keywords

A Lightweight Genetic Based Algorithm for Data Security in Wireless Body Area Networks

Sign Up to like & get
recommendations!
Published in 2020 at "IEEE Access"

DOI: 10.1109/access.2020.3028686

Abstract: The new generation of wireless body area networks (WBAN) for the internet of things (IoT) is emerging in a fast-paced. Today patients can be tested using remote clinical nanosensors. WBAN involves small interconnected sensors for… read more here.

Keywords: body area; area networks; data security; security ... See more keywords

Towards Big Data Security Framework by Leveraging Fragmentation and Blockchain Technology

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Access"

DOI: 10.1109/access.2022.3144632

Abstract: The world is facing a growth in the amount and variety of data generated by both users and machines. Despite the exponential increases, the tools and technologies developed to manage these data volumes are not… read more here.

Keywords: data security; fragmentation; big data; blockchain technology ... See more keywords

Research on Data Security Model of Environmental Monitoring Based on Blockchain

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Access"

DOI: 10.1109/access.2022.3221109

Abstract: With the rapid development of the social economy, the problem of environmental pollution has been widely concerned. The existing environmental monitoring system adopts a hierarchical centralized management structure, which has some problems, such as data… read more here.

Keywords: data security; monitoring data; security; monitoring ... See more keywords

Comprehensive Review and Analysis of Cryptography Techniques in Cloud Computing

Sign Up to like & get
recommendations!
Published in 2024 at "IEEE Access"

DOI: 10.1109/access.2024.3385449

Abstract: Cloud computing is a fast-growing industry that offers various online services, including software, computing resources, and databases. Its payment model is usage-based, whereas consistency is based on resource-sharing. Cloud storage is popular among individuals and… read more here.

Keywords: cloud computing; comprehensive review; analysis; cryptography ... See more keywords

Data Security Utilizing a Memristive Coupled Neural Network in 3D Models

Sign Up to like & get
recommendations!
Published in 2024 at "IEEE Access"

DOI: 10.1109/access.2024.3447075

Abstract: This article proposes a novel double data security algorithm that first encrypts sensitive data using a two-stage encryption method based on numerical solutions from a fractional-order memristive coupled neural network system. Solutions are obtained to… read more here.

Keywords: memristive coupled; coupled neural; encryption; security ... See more keywords

CryptSQLite: SQLite With High Data Security

Sign Up to like & get
recommendations!
Published in 2020 at "IEEE Transactions on Computers"

DOI: 10.1109/tc.2019.2963303

Abstract: SQLite, one of the most popular light-weighted database system, has been widely used in various systems. However, the compact design of SQLite did not make enough consideration on user data security. Specifically, anyone who has… read more here.

Keywords: sqlite high; database; cryptsqlite sqlite; high data ... See more keywords