Articles with "secure storage" as a keyword



Photo from wikipedia

Secure storage scheme of trajectory data for digital tracking mechanism

Sign Up to like & get
recommendations!
Published in 2022 at "International Journal of Intelligent Systems"

DOI: 10.1002/int.23095

Abstract: The application of digital tracking mechanism introduces a series of leakage problems of users' personal sensitive information related to the trajectory. Therefore, we propose a secure storage scheme for trajectory data. Firstly, four‐dimensional spatiotemporal clustering… read more here.

Keywords: digital tracking; trajectory data; storage scheme; secure storage ... See more keywords
Photo by chrisliverani from unsplash

Blockchain-Based Medical Records Secure Storage and Medical Service Framework

Sign Up to like & get
recommendations!
Published in 2018 at "Journal of Medical Systems"

DOI: 10.1007/s10916-018-1121-4

Abstract: Accurate and complete medical data are one valuable asset for patients. Privacy protection and the secure storage of medical data are crucial issues during medical services. Secure storage and making full use of personal medical… read more here.

Keywords: storage; secure storage; blockchain; medical records ... See more keywords
Photo by jonathanborba from unsplash

Implementation of a Secure Storage Using Blockchain for PCA-FRF Sensor Data of Plate-Like Structures

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Access"

DOI: 10.1109/access.2022.3197776

Abstract: Structural Health Monitoring (SHM) systems have widely been used to guarantee the safe functioning of electrical, mechanical, civil, and aerospace engineering assets. It is required to improve the SHM systems from different aspects in terms… read more here.

Keywords: blockchain; plate like; storage using; secure storage ... See more keywords
Photo from wikipedia

Secure Storage Capacity Under Rate Constraints—Continuity and Super Activation

Sign Up to like & get
recommendations!
Published in 2020 at "IEEE Transactions on Information Forensics and Security"

DOI: 10.1109/tifs.2019.2929945

Abstract: The source model for secret key generation with one way public communication refers to a setting in which a secret key should be agreed upon at two terminals. At both terminals correlated components of a… read more here.

Keywords: super activation; rate; storage; capacity ... See more keywords