Results 51 to 60 of about 106,465 (133)

Secure spontaneous emergency access to personal health record [PDF]

open access: yes, 2011
We propose a system which enables access to the user's Personal Health Record (PHR) in the event of emergency. The access typically occurs in an ad-hoc and spontaneous manner and the user is usually unconscious, hence rendering the unavailability of ...
Asim, M.   +3 more
core  

An efficient conjunctive keyword searchable encryption for cloud-based IoT systems

open access: yesDigital Communications and Networks
Data privacy leakage has always been a critical concern in cloud-based Internet of Things (IoT) systems. Dynamic Symmetric Searchable Encryption (DSSE) with forward and backward privacy aims to address this issue by enabling updates and retrievals of ...
Tianqi Peng   +6 more
doaj   +1 more source

A novel framework for phishing detection based on backward recursive feature selection

open access: yesEgyptian Informatics Journal
Feature selection plays a crucial role in enhancing the accuracy and efficiency of phishing detection systems. Various innovative approaches have been proposed to optimize feature selection, which is essential for improving model performance and reducing
Esraa Abu Elsoud   +7 more
doaj   +1 more source

Group-Signature and Group Session Key Combined Safety Message Authentication Protocol for VANETs

open access: yesIEEE Access, 2019
Anonymous authentication has significant contribution to privacy protection in safety message dissemination for Vehicular Ad Hoc Networks (VANETs); however, it suffers from heavy workload of vehicle revocation check and message signature verification ...
Chunhua Zhang   +4 more
doaj   +1 more source

SEAC: dynamic searchable symmetric encryption with lightweight update-search permission control

open access: yesCybersecurity
Sharing electronic protected health information (ePHI) is highly beneficial in public affairs. Constructing a cloud-assisted ePHI retrieval service represents a modern strategy that enhances cost-effectiveness and efficiency, making it a promising ...
Zhuobin Hu   +6 more
doaj   +1 more source

RFID Tag Ownership Transfer Protocol with Retrospective Ability

open access: yesCybernetics and Information Technologies, 2015
Tag ownership transfer is an important process for RFID system. Besides the user needs to obtain the information concerning the quality of products in some scenarios, which are attached by tags.
Gan Yong, He Lei, Yin Yi-feng
doaj   +1 more source

Dynamic Pattern Matching on Encrypted Data With Forward and Backward Security

open access: yesIET Information Security
Pattern matching is widely used in applications such as genomic data query analysis, network intrusion detection, and deep packet inspection (DPI). Performing pattern matching on plaintext data is straightforward, but the need to protect the security of ...
Xiaolu Chu   +3 more
doaj   +1 more source

BVS: A Lightweight Forward and Backward Secure Scheme for PMU Communications in Smart Grid

open access: yesInternational Journal of Digital Multimedia Broadcasting, 2011
In smart grid, phaser measurement units (PMUs) can upload readings to utility centers via supervisory control and data acquisition (SCADA) or energy management system (EMS) to enable intelligent controlling and scheduling.
Wei Ren, Jun Song, Min Lei, Yi Ren
doaj   +1 more source

Model‐Inversion‐Resistant Physical Unclonable Neural Network Using Vertical NAND Flash Memory

open access: yesAdvanced Science
The growing use of neural networks in privacy‐sensitive applications necessitates architectures that inherently protect both data and model integrity.
Sung‐Ho Park   +8 more
doaj   +1 more source

Teaching AI awareness in middle school classrooms: Design, implementation and evaluation of two education modules on algorithmic bias and filter bubbles

open access: yesComputers and Education: Artificial Intelligence
The nascent digital footprints of adolescents make them particularly susceptible to being misrepresented by AI systems. We design, implement, and evaluate two educational modules on the causes and consequences of two particularly salient types of AI ...
Mehtab Iqbal   +7 more
doaj   +1 more source

Home - About - Disclaimer - Privacy