We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 21-40 of 289 results
  1. A Novel Secure Vector Product for Protecting the Privacy of Data in Vertically Partitioned Dataset

    The contemporary advancements in the field of data collecting, storage and networking have resulted in data being saved and kept at many locations....
    Conference paper 2022
  2. An Extended Wavelet Based Federated Convolutional Quotient Multipixel Value Differencing for Secured Data Transmission Outline

    In a distributed communication channel, the safety of photographic files is a challenging task. To protect the image information, various approaches...

    D. Shivaramakrishna, M. Nagaratna in Wireless Personal Communications
    Article 30 May 2024
  3. A Φ-Differential Privacy Scheme for Incentive-Based Demand Response in Smart Grid

    Smart meters are devices that facilitate the collection of energy consumption data in almost real-time for individual users. Smart grids rely on...
    Xuyan Yao, Yutong Wu, ... Yuan Tian in Computational and Experimental Simulations in Engineering
    Conference paper 2024
  4. An Overview of Text Steganalysis

    With the rapid development of the Internet, network information security is progressively under menace. Text steganography is one of the key reasons...
    Conference paper 2022
  5. Hardware-Based Authentication Applications

    Authentication is one of the most fundamental problems in computer security. Implementation of any authentication and authorization protocol requires...
    Md Tanvir Arafin, Gang Qu in Authentication of Embedded Devices
    Chapter 2021
  6. State-of-the-Art Survey of Quantum Cryptography

    In today Internet era, confidential information transmitted over an insecure channel. With the significant development in the area of quantum...

    Ajay Kumar, Sunita Garhwal in Archives of Computational Methods in Engineering
    Article 19 April 2021
  7. BCVSE: Verifiable Searchable Encryption Scheme With Blockchain Supporting Fuzzy Query

    In new generation of Internet applications such as smart healthcare and digital finance, sharing data to gain its value has become popular. However,...

    Fucai Zhou, Zi Jiao, ... **tong Sun in Arabian Journal for Science and Engineering
    Article 27 November 2023
  8. Challenges in making blockchain privacy compliant for the digital world: some measures

    Due to the pandemic, most of the personal transactions relating to finance, commerce and healthcare services have gone online making privacy...

    Smita Bansod, Lata Ragha in Sādhanā
    Article 18 August 2022
  9. Fedlabx: a practical and privacy-preserving framework for federated learning

    Federated learning (FL) draws attention in academia and industry due to its privacy-preserving capability in training machine learning models....

    Yu** Yan, Mohammed B. M. Kamel, ... Ákos Tényi in Complex & Intelligent Systems
    Article Open access 31 July 2023
  10. Cloud-based email phishing attack using machine and deep learning algorithm

    Cloud computing refers to the on-demand availability of personal computer system assets, specifically data storage and processing power, without the...

    Umer Ahmed Butt, Rashid Amin, ... Ali Ahmadian in Complex & Intelligent Systems
    Article Open access 02 June 2022
  11. A Proposal of Blockchain and NFC-Based Electronic Voting System

    One of the most significant ways for a community to make a decision and the most democratic event in today’s countries is voting. Therefore,...
    Hanane Echchaoui, Boudrali Roumaissa, Rachid Boudour in Advanced Computational Techniques for Renewable Energy Systems
    Conference paper 2023
  12. Develo** a Safer Educational Environment that Preserves Users’ Privacy

    This study proposes an e-attendance system that improves students’ safety and preserves user privacy and children's rights. The system provides an...
    Sofia Sakka, Vasiliki Liagkou, Chrysostomos Stylios in Reliability and Statistics in Transportation and Communication
    Conference paper 2024
  13. An improved lattice based certificateless data integrity verification techniques for cloud computing

    Today, cloud computing security schemes face many challenges, risks, and pitfalls. Digital signatures are vital security measures that must not be...

    Dilli Babu Salvakkam, Rajendra Pamula in Journal of Ambient Intelligence and Humanized Computing
    Article 26 April 2023
  14. HCAC-EHR: hybrid cryptographic access control for secure EHR retrieval in healthcare cloud

    Technology that is perfect is free of vulnerability. Technological growth offers users online data storage and access to it from anywhere. Cloud...

    Article 26 February 2021
  15. Enhancing Privacy in VANET Through Attribute-Based Encryption and Blockchain Integration: Uncovering the Benefits and Challenges

    With the popularity of blockchain innovation, data security has become a concern. The blockchain framework is transparent and immutable, but its...
    Conference paper 2024
  16. Novel Smart Homecare IoT System with Edge-AI and Blockchain

    Healthcare data is sensitive information that demands security and confidentiality. Currently, remote monitoring is widely applied as it provides...
    Tri Nguyen, Tuan Nguyen Gia in Blockchain and its Applications in Industry 4.0
    Chapter 2023
  17. Quantum Technologies I: Information, Communication, and Computation

    In this chapter, we introduce some of the notions of quantum information science including aspects of information, information security, entanglement...
    Chapter 2022
  18. Intelligent Heuristic Keyword-Based Search Methodologies Applied to Cryptographic Cloud Environment

    Cloud computing is now considered as one of the very important part in information technology. Relying on data transferred to a cloud server has been...
    Panchal Mital Nikunj, Dushyantsinh B. Rathod, Jaykumar Dave in ICT with Intelligent Applications
    Conference paper 2023
  19. Design and Implementation of Verifiable Blockchain-Based e-voting System

    Voting is the most representative way to express individual decision making in a democratic society. The classic voting method requires a lot of...
    Conference paper 2023
  20. Blockchain-Integrated Secure Framework for Enhanced E-Government Services

    As the digital transformation of public services intensifies, e-government systems face significant challenges in identity verification and data...
    Sajedul Talukder, Md Jahangir Alam, ... Sai Puppala in Building Cybersecurity Applications with Blockchain and Smart Contracts
    Chapter 2024
Did you find what you were looking for? Share feedback.