Results 61 to 70 of about 2,959 (212)

Towards Enhancing Healthcare Data Privacy: Integrating BioClinicalBERT With Polyalphabetic Cipher for Entity Recognition and Anonymization

open access: yesEngineering Reports, Volume 8, Issue 3, March 2026.
This study presents a dual‐layered anonymization model combining BioClinicalBERT and polyalphabetic cipher to accurately identify and protect sensitive healthcare data. It achieves strong F1 scores while maintaining data utility, enabling privacy‐preserving clinical research compliant with GDPR and HIPAA regulations.
Deblina Mazumder Setu   +3 more
wiley   +1 more source

A Lightweight Hash-Based Blockchain Architecture for Industrial IoT

open access: yesApplied Sciences, 2019
Blockchain is a technology that can ensure data integrity in a distributed network, and it is actively applied in various fields. Recently, blockchain is gaining attention due to combining with the Internet of Things (IoT) technology in the industrial ...
Byoungjin Seok   +2 more
doaj   +1 more source

Network Security Empowered Digital Teaching Data Protection Algorithm for Ceramic Technology

open access: yesEngineering Reports, Volume 8, Issue 3, March 2026.
In this paper, a complete algorithm system covering sensitivity identification, feature fusion, encrypted transmission and cultural image protection is established based on the ceramic teaching scene enabled by network security. ABSTRACT The digitalization of ceramic technology teaching generates sensitive multi‐modal data, including personal ...
Yuting Zhu   +3 more
wiley   +1 more source

Cryptanalysis of Basic Bloom Filters Used for Privacy Preserving Record Linkage

open access: yesThe Journal of Privacy and Confidentiality, 2014
Bloom filter encoded identifiers are increasingly used for privacy preserving record linkage applications, because they allow for errors in encrypted identifiers. However, little research on the security of Bloom filters has been published so far.
Frank Niedermeyer   +3 more
doaj   +1 more source

Cryptanalysis of Curl-P and Other Attacks on the IOTA Cryptocurrency

open access: yesIACR Transactions on Symmetric Cryptology, 2020
We present attacks on the cryptography formerly used in the IOTA blockchain, including under certain conditions the ability to forge signatures. We developed practical attacks on IOTA’s cryptographic hash function Curl-P-27, allowing us to quickly ...
Ethan Heilman   +6 more
doaj   +1 more source

Smart Waste, Smarter World: Exploring Waste Types, Trends, and Tech‐Driven Valorization Through Artificial Intelligence, Internet of Things, and Blockchain

open access: yesSustainable Development, Volume 34, Issue S2, Page 132-153, March 2026.
ABSTRACT Global municipal solid waste generation is projected to exceed 3.8 billion tonnes annually by 2050. This makes the need for smart, inclusive, and scalable waste valorization systems more urgent than ever. This review critically explores the shift from conventional waste management to intelligent, technology‐driven solutions aligned with ...
Segun E. Ibitoye   +8 more
wiley   +1 more source

Trustworthy Federated Learning for Industrial IoT: Balancing Robustness and Fairness via Blockchain‐Based Reputation

open access: yesArtificial Intelligence for Engineering, Volume 2, Issue 1, Page 67-77, March 2026.
This paper proposes Block‐FairFL, a Trustworthy Federated Learning framework empowered by Blockchain, to address the dual challenges of security and fairness in deploying AI for industrial engineering. ABSTRACT The integration of artificial intelligence into the industrial Internet of Things is pivotal for predictive maintenance and autonomous control.
Hui Li
wiley   +1 more source

Protocol‐Agnostic Meta Key Distribution for Encrypted Wireless Communications Enabled by Space‐Time‐Coding Metasurface

open access: yesAdvanced Science, Volume 13, Issue 7, 3 February 2026.
This paper presents a programmable metasurface‐based Meta Key Distribution (MKD) system for secure, protocol‐independent key exchange in indoor wireless settings. By embedding entropy into the wireless channel, it enables lightweight, compatible cryptographic key generation.
Xinyu Li   +7 more
wiley   +1 more source

Securing Generative Artificial Intelligence with Parallel Magnetic Tunnel Junction True Randomness

open access: yesAdvanced Intelligent Systems, Volume 8, Issue 2, February 2026.
True random numbers can protect generative artificial intelligence (GAI) models from attacks. A highly parallel, spin‐transfer torque magnetic tunnel junction‐based system is demonstrated that generates high‐quality, energy‐efficient random numbers.
Youwei Bao, Shuhan Yang, Hyunsoo Yang
wiley   +1 more source

Design of Self‐Healing Mesh Architecture: A Proof‐of‐Stake AODV Routing Protocol With Autonomous Adaptability

open access: yesEngineering Reports, Volume 8, Issue 2, February 2026.
Graphical Abstract of the Poposed PoSAODV. ABSTRACT The emergence of wireless technology brought about enhanced communication across various devices, resulting in the demand for efficient and reliable wireless networks, like wireless mesh networks (WMNs) and mobile Ad‐hoc Networks (MANETs).
Suale Yakubu   +2 more
wiley   +1 more source

Home - About - Disclaimer - Privacy