Results 71 to 80 of about 5,325 (187)
The rapid increase in the number of internet of things (IoT) devices in the healthcare sector has produced an ecosystem of multimodal data that includes physiological signals, behavioral measurements, and electronic health records. Nevertheless, centralized analytics are dangerous to the privacy and safety of patient data.
Ravikumar R. N. +4 more
wiley +1 more source
Homomorphic Encryption with Access Policies: Characterization and New Constructions
A characterization of predicate encryption (PE) with support for homomorphic operations is presented and we describe the homomorphic properties of some existing PE constructions.
Clear, Michael +2 more
core +1 more source
ABSTRACT E‐learning systems in an educational environment designed for wireless area networks for schools, universities, and research institutions provide consistency and better retention for students, professors, and researchers. An E‐learning system is known for storing lecture documents and live video conferences that are transmitted over public ...
Ahmed A. Mawgoud +4 more
wiley +1 more source
A Keyword-Searchable ABE Scheme From Lattice in Cloud Storage Environment
Currently, the security situation of data security and user privacy protection is increasingly serious in cloud environment. Ciphertext data storage can prevent the risk of user's privacy disclosure.
Lihua Liu +3 more
doaj +1 more source
ABSTRACT Quantum key distribution (QKD) allows the generation of cryptographic keys beyond the computational hardness paradigm and is befitting for secure data transmission requiring long‐term security. The communication distance of fiber‐based QKD, however, is limited to a few hundred kilometers due to the exponential scaling of signal attenuation ...
Davide Orsucci +7 more
wiley +1 more source
Verifiable Outsourced Decryption OO-CP-ABE Access Control Scheme with Hidden Policy [PDF]
In Ciphertext-Policy Attribute-Based Encryption(CP-ABE),the time required for data encryption and decryption is related to the complexity of the access structure,so implementing CP-ABE in mobile devices makes the device under greater computational ...
DILXAT Ghopur, CHEN Cheng, NURMAMAT Helil
doaj +1 more source
Abstract The Internet of Things (IoT) effortlessly enables communication between items on the World Wide Web and other systems. This extensive use of IoTs has created new services and automation in numerous industries, enhancing the standard of living, especially in healthcare.
Ehtesham Safeer +5 more
wiley +1 more source
State of The Art and Hot Aspects in Cloud Data Storage Security [PDF]
Along with the evolution of cloud computing and cloud storage towards matu- rity, researchers have analyzed an increasing range of cloud computing security aspects, data security being an important topic in this area.
Gehrmann, Christian +2 more
core +3 more sources
HTAC: Fine-Grained Policy-Hiding and Traceable Access Control in mHealth
As an emerging cryptographic primitive, Ciphertext-Policy Attribute-Based Encryption (CP-ABE) is suitable for the owner to share his personal health records (PHRs) in mobile healthcare systems (mHealth).
Qi Li +5 more
doaj +1 more source
This research introduces a blockchain‐based framework designed to securely share medical images, with a focus on maintaining data integrity and privacy. The system uses image compression and a deep neural network‐based subject sensitive hashing (SSH) to ensure the integrity of the feature maps, storing encrypted images on the InterPlanetary File System
Yeasir Arafat +7 more
wiley +1 more source

