We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 1-20 of 10,000 results
  1. A hybrid optimization approach for securing cloud-based e-health systems

    In modern healthcare, cloud-based e-health technology offers substantial benefits but faces significant security challenges. Sensitive patient data...

    Abdulhadi Altherwi, Mohammad Tauheed Ahmad, ... Rezaul Azim in Multimedia Tools and Applications
    Article 28 June 2024
  2. Distributed edge to cloud ensemble deep learning architecture to diagnose Covid-19 from lung image in IoT based e-Health system

    Today, with the expansion of technology and new architectures of deep learning, the accuracy of artificial intelligence methods in diagnosing...

    Mohammadreza Zamani, Saeed Sharifian in The Journal of Supercomputing
    Article 18 May 2024
  3. Exploitation of healthcare IoT–fog-based smart e-health gateways: a resource optimization approach

    In the domains of health and medicine, current technology facilitates the quicker identification of effective solutions. Smart electronic health...

    Bo Wen, Shanzhi Li, Hooman Motevalli in Cluster Computing
    Article 10 May 2024
  4. CP2EH: a comprehensive privacy-preserving e-health scheme over cloud

    In the Attribute-Based Encryption (ABE) scheme, patients encrypt their electronic health record (EHR), attach the appropriate attributes with it, and...

    Vijay Kumar Yadav, Rakesh Kumar Yadav, ... S. Venkatesan in The Journal of Supercomputing
    Article 28 June 2021
  5. A Novel Resilient and Intelligent Predictive Model for CPS-Enabled E-Health Applications

    Cyber-physical-social-systems interconnect diverse technologies and communication infrastructure to the Internet for environmental sensing and...

    Amjad Rehman, Khalid Haseeb, ... Gwanggil Jeon in Cognitive Computation
    Article 05 April 2024
  6. Modeling the Green Cloud Continuum: integrating energy considerations into Cloud–Edge models

    The energy consumption of Cloud–Edge systems is becoming a critical concern economically, environmentally, and societally; some studies suggest data...

    Yashwant Singh Patel, Paul Townend, ... Per-Olov Östberg in Cluster Computing
    Article Open access 09 April 2024
  7. Cloud-HPA: hierarchical privacy perseverance anatomy for data storage in cloud environment

    Sharing the data in the cloud environment may generate some loopholes and backdoor entries for intruders. In concern to the attributes of storage...

    Ashutosh Kumar Singh, Niharika Singh, Ishu Gupta in Multimedia Tools and Applications
    Article 30 September 2023
  8. Encryption with access policy and cloud data selection for secure and energy-efficient cloud computing

    With the rapid advancements in technology, cloud computing has emerged as a prominent paradigm for efficient data storage and processing. However,...

    M. Indrasena Reddy, P. Venkateswara Rao, ... Srinivasa Reddy K in Multimedia Tools and Applications
    Article 18 July 2023
  9. Designing an Attribute-Based Encryption Scheme with an Enhanced Anonymity Model for Privacy Protection in E-Health

    The medical field and the health care industry generate large volumes of data that are ultimately beneficial to society. Yet, the exposure of...

    Kirtirajsinh Zala, Hiren Kumar Thakkar, ... Deep Thumar in SN Computer Science
    Article 13 January 2024
  10. Retraction Note: Securing e-health records using keyless signature infrastructure blockchain technology in the cloud

    Gayathri Nagasubramanian, Rakesh Kumar Sakthivel, ... Balamurugan Balusamy in Neural Computing and Applications
    Article 29 April 2024
  11. Secure Authentication and Reliable Cloud Storage Scheme for IoT-Edge-Cloud Integration

    The Internet of Things (IoT) devices are used in almost every aspect of life to automate routine or critical tasks with great precision. The IoT...

    Ajay Chaudhary, Sateesh K Peddoju, Vikas Chouhan in Journal of Grid Computing
    Article 27 June 2023
  12. DNA-chaos governed cryptosystem for cloud-based medical image repository

    Nowadays, digital medical images have become an essential source for the grand success of e-health technology. At the same time, the massive storage...

    Nithya Chidambaram, K. Thenmozhi, ... Rengarajan Amirtharajan in Cluster Computing
    Article 12 April 2024
  13. An efficient secure channel establishment through lightweight key distribution in e-health communication systems

    E-healthcare has significantly improved healthcare services and overall health by utilizing digital technologies such as the internet, computers, and...

    Iman Ebrahimi, Morteza Nikooghadam in Multimedia Tools and Applications
    Article 07 May 2024
  14. Research on Older Adults’ Interaction with E-Health Interface Based on Explainable Artificial Intelligence

    This paper proposed a comprehensive mixed-methods framework with varied samples of older adults, including user experience, usability assessments,...
    Xueting Huang, Zhibo Zhang, ... Kexin Wu in Human Aspects of IT for the Aged Population
    Conference paper 2024
  15. Quantum cryptography based cloud security model (QC-CSM) for ensuring cloud data security in storage and accessing

    In recent days, cloud computing is a universal computing and conventional paradigm, in which the resources are provided over the Internet based on...

    K. Sundar, S. Sasikumar, ... S. karthick in Multimedia Tools and Applications
    Article 24 April 2023
  16. Spoofing detection system for e-health digital twin using EfficientNet Convolution Neural Network

    Digital Twin is the mirror image of any living or non-living objects. Digital Twin and Cyber-physical system (CPS) provides a new era for industries...

    Hitendra Garg, Bhisham Sharma, ... Rohit Agarwal in Multimedia Tools and Applications
    Article 06 January 2022
  17. Efficient Mobile Security for E Health Care Application in Cloud for Secure Payment Using Key Distribution

    Through the growing attractiveness of the financial world, the e health care application has developed quicker than the previous period, such that...

    A. Saranya, R. Naresh in Neural Processing Letters
    Article 27 March 2021
  18. Blockchain Survey for Security and Privacy in the e-Health Ecosystem

    This survey paper focuses on the use of blockchain technology to ensure security and privacy properties in e-health applications. For that,...
    Maher Boughdiri, Takoua Abdellatif, Tesnim Abdellatif in Risks and Security of Internet and Systems
    Conference paper 2023
  19. Biosignal encryption algorithm based on Ushio chaotic map for e-health

    In last years, chaos-based encryption algorithms have been proposed in the literature to provide information confidentiality in digital images,...

    Miguel Ángel Murillo-Escobar, José Alfonso Quintana-Ibarra, ... Rosa Martha López-Gutiérrez in Multimedia Tools and Applications
    Article 18 November 2022
  20. Cloud Cost Visibility

    Chapter 1 established the importance of a “construction project manager” (FinOps), using the analogy of building...
    Sasi Kanumuri, Matthew Zeier in Scaling Cloud FinOps
    Chapter 2024
Did you find what you were looking for? Share feedback.