Results 71 to 80 of about 5,325 (187)

Privacy‐Aware Federated Recommender Systems for IoT Healthcare: A Review of Computational Methods, Multimodality, and Optimization for Real‐Time Personalization

open access: yesApplied Computational Intelligence and Soft Computing, Volume 2026, Issue 1, 2026.
The rapid increase in the number of internet of things (IoT) devices in the healthcare sector has produced an ecosystem of multimodal data that includes physiological signals, behavioral measurements, and electronic health records. Nevertheless, centralized analytics are dangerous to the privacy and safety of patient data.
Ravikumar R. N.   +4 more
wiley   +1 more source

Homomorphic Encryption with Access Policies: Characterization and New Constructions

open access: yes, 2013
A characterization of predicate encryption (PE) with support for homomorphic operations is presented and we describe the homomorphic properties of some existing PE constructions.
Clear, Michael   +2 more
core   +1 more source

Enhancing Data Privacy and Trust in E‐Learning: A Blockchain‐Based Access Control Protocol for Cloud Educational Systems

open access: yesConcurrency and Computation: Practice and Experience, Volume 37, Issue 18-20, 30 August 2025.
ABSTRACT E‐learning systems in an educational environment designed for wireless area networks for schools, universities, and research institutions provide consistency and better retention for students, professors, and researchers. An E‐learning system is known for storing lecture documents and live video conferences that are transmitted over public ...
Ahmed A. Mawgoud   +4 more
wiley   +1 more source

A Keyword-Searchable ABE Scheme From Lattice in Cloud Storage Environment

open access: yesIEEE Access, 2019
Currently, the security situation of data security and user privacy protection is increasingly serious in cloud environment. Ciphertext data storage can prevent the risk of user's privacy disclosure.
Lihua Liu   +3 more
doaj   +1 more source

Assessment of Practical Satellite Quantum Key Distribution Architectures for Current and Near‐Future Missions

open access: yesInternational Journal of Satellite Communications and Networking, Volume 43, Issue 3, Page 164-192, May/June 2025.
ABSTRACT Quantum key distribution (QKD) allows the generation of cryptographic keys beyond the computational hardness paradigm and is befitting for secure data transmission requiring long‐term security. The communication distance of fiber‐based QKD, however, is limited to a few hundred kilometers due to the exponential scaling of signal attenuation ...
Davide Orsucci   +7 more
wiley   +1 more source

Verifiable Outsourced Decryption OO-CP-ABE Access Control Scheme with Hidden Policy [PDF]

open access: yesJisuanji gongcheng, 2019
In Ciphertext-Policy Attribute-Based Encryption(CP-ABE),the time required for data encryption and decryption is related to the complexity of the access structure,so implementing CP-ABE in mobile devices makes the device under greater computational ...
DILXAT Ghopur, CHEN Cheng, NURMAMAT Helil
doaj   +1 more source

Advanced hybrid malware identification framework for the Internet of Medical Things, driven by deep learning

open access: yesSECURITY AND PRIVACY, Volume 8, Issue 1, January/February 2025.
Abstract The Internet of Things (IoT) effortlessly enables communication between items on the World Wide Web and other systems. This extensive use of IoTs has created new services and automation in numerous industries, enhancing the standard of living, especially in healthcare.
Ehtesham Safeer   +5 more
wiley   +1 more source

State of The Art and Hot Aspects in Cloud Data Storage Security [PDF]

open access: yes, 2013
Along with the evolution of cloud computing and cloud storage towards matu- rity, researchers have analyzed an increasing range of cloud computing security aspects, data security being an important topic in this area.
Gehrmann, Christian   +2 more
core   +3 more sources

HTAC: Fine-Grained Policy-Hiding and Traceable Access Control in mHealth

open access: yesIEEE Access, 2020
As an emerging cryptographic primitive, Ciphertext-Policy Attribute-Based Encryption (CP-ABE) is suitable for the owner to share his personal health records (PHRs) in mobile healthcare systems (mHealth).
Qi Li   +5 more
doaj   +1 more source

Decentralized Medical Image Sharing: A Blockchain Based Approach with Subject Sensitive Hashing for Enhanced Privacy and Integrity

open access: yesIET Blockchain, Volume 5, Issue 1, January/December 2025.
This research introduces a blockchain‐based framework designed to securely share medical images, with a focus on maintaining data integrity and privacy. The system uses image compression and a deep neural network‐based subject sensitive hashing (SSH) to ensure the integrity of the feature maps, storing encrypted images on the InterPlanetary File System
Yeasir Arafat   +7 more
wiley   +1 more source

Home - About - Disclaimer - Privacy