Secure spontaneous emergency access to personal health record [PDF]
We propose a system which enables access to the user's Personal Health Record (PHR) in the event of emergency. The access typically occurs in an ad-hoc and spontaneous manner and the user is usually unconscious, hence rendering the unavailability of ...
Asim, M. +3 more
core
An efficient conjunctive keyword searchable encryption for cloud-based IoT systems
Data privacy leakage has always been a critical concern in cloud-based Internet of Things (IoT) systems. Dynamic Symmetric Searchable Encryption (DSSE) with forward and backward privacy aims to address this issue by enabling updates and retrievals of ...
Tianqi Peng +6 more
doaj +1 more source
A novel framework for phishing detection based on backward recursive feature selection
Feature selection plays a crucial role in enhancing the accuracy and efficiency of phishing detection systems. Various innovative approaches have been proposed to optimize feature selection, which is essential for improving model performance and reducing
Esraa Abu Elsoud +7 more
doaj +1 more source
Group-Signature and Group Session Key Combined Safety Message Authentication Protocol for VANETs
Anonymous authentication has significant contribution to privacy protection in safety message dissemination for Vehicular Ad Hoc Networks (VANETs); however, it suffers from heavy workload of vehicle revocation check and message signature verification ...
Chunhua Zhang +4 more
doaj +1 more source
SEAC: dynamic searchable symmetric encryption with lightweight update-search permission control
Sharing electronic protected health information (ePHI) is highly beneficial in public affairs. Constructing a cloud-assisted ePHI retrieval service represents a modern strategy that enhances cost-effectiveness and efficiency, making it a promising ...
Zhuobin Hu +6 more
doaj +1 more source
RFID Tag Ownership Transfer Protocol with Retrospective Ability
Tag ownership transfer is an important process for RFID system. Besides the user needs to obtain the information concerning the quality of products in some scenarios, which are attached by tags.
Gan Yong, He Lei, Yin Yi-feng
doaj +1 more source
Dynamic Pattern Matching on Encrypted Data With Forward and Backward Security
Pattern matching is widely used in applications such as genomic data query analysis, network intrusion detection, and deep packet inspection (DPI). Performing pattern matching on plaintext data is straightforward, but the need to protect the security of ...
Xiaolu Chu +3 more
doaj +1 more source
BVS: A Lightweight Forward and Backward Secure Scheme for PMU Communications in Smart Grid
In smart grid, phaser measurement units (PMUs) can upload readings to utility centers via supervisory control and data acquisition (SCADA) or energy management system (EMS) to enable intelligent controlling and scheduling.
Wei Ren, Jun Song, Min Lei, Yi Ren
doaj +1 more source
Model‐Inversion‐Resistant Physical Unclonable Neural Network Using Vertical NAND Flash Memory
The growing use of neural networks in privacy‐sensitive applications necessitates architectures that inherently protect both data and model integrity.
Sung‐Ho Park +8 more
doaj +1 more source
The nascent digital footprints of adolescents make them particularly susceptible to being misrepresented by AI systems. We design, implement, and evaluate two educational modules on the causes and consequences of two particularly salient types of AI ...
Mehtab Iqbal +7 more
doaj +1 more source

