Articles with "secure data" as a keyword



Photo from wikipedia

A Survey on Hybrid, 3D, Interference Mitigation and Secure Data Beamforming Techniques for 5G System

Sign Up to like & get
recommendations!
Published in 2020 at "Wireless Personal Communications"

DOI: 10.1007/s11277-020-07397-w

Abstract: By 2020 world will testimony new archaic Multi-antenna technologies like beamforming along with massive multiple-input multiple-output in 5G system. The cellular networks with 5th Generation (5G) are introduced with the determined aim of supporting a… read more here.

Keywords: beamforming techniques; secure data; interference mitigation; system ... See more keywords
Photo from wikipedia

Novel Secure Data Transmission Methods for IoT Based on STP-CS With Multilevel Critical Information Concealment Function

Sign Up to like & get
recommendations!
Published in 2023 at "IEEE Internet of Things Journal"

DOI: 10.1109/jiot.2022.3218681

Abstract: The Internet of Things (IoT) is a large-scale network of various sensing devices connected via the Internet to achieve intelligent functions. Efficient secure data transmission is a significant guarantee for specific functions of IoT. In… read more here.

Keywords: data transmission; transmission; transmission methods; novel secure ... See more keywords
Photo by campaign_creators from unsplash

Flexible Physical Layer Security for Joint Data and Pilots in Future Wireless Networks

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Transactions on Communications"

DOI: 10.1109/tcomm.2022.3151341

Abstract: In this work, novel physical layer security (PLS) schemes are proposed for orthogonal frequency-division multiplexing (OFDM) to secure both data and pilots. The majority of previous studies focus on only securing the data without considering… read more here.

Keywords: data pilots; physical layer; security; layer security ... See more keywords
Photo by drew_hays from unsplash

SDH: Secure Data Hiding in Fused Medical Image for Smart Healthcare

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Transactions on Computational Social Systems"

DOI: 10.1109/tcss.2021.3125025

Abstract: Fusing the single modality medical images to obtain a distinct multimodality image is needed to ensure a better clinical experience. However, the distribution of these fused images brings the issues of ownership and authentication and… read more here.

Keywords: hiding fused; fused medical; medical image; image ... See more keywords
Photo from wikipedia

Toward Secure Data Fusion in Industrial IoT Using Transfer Learning

Sign Up to like & get
recommendations!
Published in 2021 at "IEEE Transactions on Industrial Informatics"

DOI: 10.1109/tii.2020.3038780

Abstract: As an emerging technology, the industrial Internet of Things (IIoT) can promote the development of industrial intelligence, improve production efficiency, and reduce manufacturing costs. In IIoT, the improvement and progress of industrial production and applications… read more here.

Keywords: data fusion; transfer learning; secure data; fusion ... See more keywords
Photo by ldxcreative from unsplash

A Secure Data Sharing Scheme in Community Segmented Vehicular Social Networks for 6G

Sign Up to like & get
recommendations!
Published in 2023 at "IEEE Transactions on Industrial Informatics"

DOI: 10.1109/tii.2022.3188963

Abstract: The use of aerial base stations, AI cloud, and satellite storage can help manage location, traffic, and specific application-based services for vehicular social networks. However, sharing of such data makes the vehicular network vulnerable to… read more here.

Keywords: data sharing; social networks; community; vehicular social ... See more keywords
Photo by goumbik from unsplash

SecRBAC: Secure data in the Clouds

Sign Up to like & get
recommendations!
Published in 2017 at "IEEE Transactions on Services Computing"

DOI: 10.1109/tsc.2016.2553668

Abstract: Most current security solutions are based on perimeter security. However, Cloud computing breaks the organization perimeters. When data resides in the Cloud, they reside outside the organizational bounds. This leads users to a loos of… read more here.

Keywords: control; data clouds; security; service provider ... See more keywords
Photo by campaign_creators from unsplash

PF-DA: Pairing Free and Secure Data Aggregation for Energy Internet-Based Smart Meter-to-Grid Communication

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Transactions on Smart Grid"

DOI: 10.1109/tsg.2021.3138393

Abstract: The amalgamation of energy, economics and information technology has evolved the paradigm of Energy Internet (EI). This evolution of EI has transformed houses or buildings into home networks (HN) to ease communication between consumer-to-grid. Smart… read more here.

Keywords: aggregation; data aggregation; energy internet; pairing free ... See more keywords
Photo by campaign_creators from unsplash

Secure Data Deduplication Protocol for Edge-Assisted Mobile CrowdSensing Services

Sign Up to like & get
recommendations!
Published in 2021 at "IEEE Transactions on Vehicular Technology"

DOI: 10.1109/tvt.2020.3035588

Abstract: Data deduplication for edge-based mobile crowdsensing services removes duplicate data to minimize storage space and enhance communication efficiency. However, secure data deduplication in edge-based mobile crowdsensing applications can be challenging to achieve in concurrent with… read more here.

Keywords: data deduplication; secure data; crowdsensing services; mobile crowdsensing ... See more keywords
Photo by campaign_creators from unsplash

An Efficient and Secure Data Sharing Method Using Asymmetric Pairing with Shorter Ciphertext to Enable Rapid Learning in Healthcare

Sign Up to like & get
recommendations!
Published in 2022 at "Computational Intelligence and Neuroscience"

DOI: 10.1155/2022/4788031

Abstract: The recent advent of cloud computing provides a flexible way to effectively share data among multiple users. Cloud computing and cryptographic primitives are changing the way of healthcare unprecedentedly by providing real-time data sharing cost-effectively.… read more here.

Keywords: data sharing; sharing method; secure; efficient secure ... See more keywords
Photo from academic.microsoft.com

A simple method to secure data-driven improvement of perioperative care.

Sign Up to like & get
recommendations!
Published in 2020 at "British journal of nursing"

DOI: 10.12968/bjon.2020.29.9.516

Abstract: BACKGROUND Enhanced recovery after surgery (ERAS) programmes have been adopted to a varying degree by most surgical departments, not only in Denmark, but worldwide. AIMS To report the process from a local ERAS unit in… read more here.

Keywords: eras programmes; data driven; eras unit; secure data ... See more keywords