Search
Search Results
-
Security Layer
The security layer creates a barrier between a user and the data. This can be in the form of restricting visibility, performing updates or deletions,... -
Data Layer
The data layer handles the table design and architecture, as well as storage and access to the data. In Dataverse, like in other tools in Power... -
Presentation Layer
The presentation layer consists of various methods of presenting and interacting with your data. In Power Platform, there are several tools with... -
Attack resistant blockchain-based healthcare record system using modified RSA Algorithm
Electronic Health Records (EHRs) are steadily becoming the central information system for the healthcare industry. EHRs are not completely secure and...
-
Business Logic Layer
The business logic layer consists of various tools that ensure data is entered and maintained in a predictable way. Through a series of rules,... -
Robust Channels: Handling Unreliable Networks in the Record Layers of QUIC and DTLS 1.3
The common approach in secure communication channel protocols is to rely on ciphertexts arriving in-order and to close the connection upon any rogue...
-
Research of Electronic Medical Record System Based on Blockchain
The traditional medical record system is stored in the hospital side, which is not convenient for data sharing and transmission between hospitals;... -
Flash Translation Layer (FTL)
The flash translation layer (FTL) is a key component of the firmware in a NAND-based solid-state drive (SSD). It is responsible for managing the... -
Privacy-preserving record linkage using autoencoders
Privacy-preserving record linkage (PPRL) is the process aimed at identifying records that represent the same real-world entity across different data...
-
Transport Layer Security
At the time of writing, TLS version 1.2 is the only version supported by all websites. This is one of the reasons why we chose version 1.2 for a... -
TLS – Transport Layer Security Protocol
Das Transport Layer Security (TLS) Protocol ist ein Protokoll zur Authentifizierung, Verschlüsselung und Integritätssicherung, das vor allem in der... -
Layer 2 Scaling Solutions for Blockchains
Many blockchain protocols suffer from scalability issues. One way to improve the scalability of existing solutions is to improve the underlying... -
Transport Layer Security (TLS)/Secure Socket Layer (SSL)
Im Kapitel „Transport Layer Security (TLS)/Secure Socket Layer (SSL) – TLS/SSL“ werden die Cyber-Sicherheitsarchitektur, Cyber-Sicherheitsprinzipien,... -
Efficient Rollup Batch Posting Strategy on Base Layer
We design efficient and robust algorithms for the batch posting of rollup chain calldata on the base layer chain, using tools from operations... -
Secure Electronic Health Record Storage and Retrieval Using Blockchain and Encryption for Healthcare Application
With the rapid advancement of digital technologies, the electronic health record is not a concept but a reality. Electronic health records (EHR) are...
-
Blockchain-Driven Animal Healthcare: Leveraging NFTs, IPFS, and Smart Contracts for Comprehensive Animal Medical Record
The domain of animal healthcare mandates robust mechanisms for maintaining the sanctity, reachability, and security of medical record. This paper... -
Application of Deep Learning Methods in the Diagnosis of Coronary Heart Disease Based on Electronic Health Record
With the development of Internet technology, the number of electronic health record data has surged. Also, artificial intelligence simulates the... -
Physical Layer Authentication
Physical layer authentication (PLA) represents another promising application of the PLS technology in wireless communications, aiming at establishing... -
An abnormal surgical record recognition model with keywords combination patterns based on TextRank for medical insurance fraud detection
Increasing insurance fraud has resulted in the loss of large amounts of money, making it difficult to expand insurance coverage and scale. This...
-
A Dual-Layer Privacy-Preserving Federated Learning Framework
With the exponential growth of personal data use for machine learning models, significant privacy challenges arise. Anonymisation and federated...