Results 101 to 110 of about 65,060 (255)

A secured cloud‐medical data sharing with A‐BRSA and Salp ‐Ant Lion Optimisation Algorithm

open access: yesCAAI Transactions on Intelligence Technology, EarlyView.
Abstract Sharing medical data among healthcare providers, researchers, and patients is crucial for efficient healthcare services. Cloud‐assisted smart healthcare (s‐healthcare) systems have made it easier to store EHRs effectively. However, the traditional encryption algorithms used to secure this data can be vulnerable to attacks if the encryption key
Adel Binbusayyis   +7 more
wiley   +1 more source

Simulatable security for quantum protocols

open access: yes, 2004
The notion of simulatable security (reactive simulatability, universal composability) is a powerful tool for allowing the modular design of cryptographic protocols (composition of protocols) and showing the security of a given protocol embedded in a ...
Unruh, Dominique
core  

Enabling pandemic‐resilient healthcare: Narrowband Internet of Things and edge intelligence for real‐time monitoring

open access: yesCAAI Transactions on Intelligence Technology, EarlyView.
Abstract The Internet of Things (IoT) in deploying robotic sprayers for pandemic‐associated disinfection and monitoring has garnered significant attention in recent research. The authors introduce a novel architectural framework designed to interconnect smart monitoring robotic devices within healthcare facilities using narrowband Internet of Things ...
Md Motaharul Islam   +9 more
wiley   +1 more source

Finding Safety in Numbers with Secure Allegation Escrows

open access: yes, 2019
For fear of retribution, the victim of a crime may be willing to report it only if other victims of the same perpetrator also step forward. Common examples include 1) identifying oneself as the victim of sexual harassment, especially by a person in a ...
Arun, Venkat   +4 more
core   +1 more source

On Cryptographic Information Security in Cloud Infrastructures: PKI and IBE Methods

open access: yesБезопасность информационных технологий, 2014
The application of cryptographic security methods in cloud infrastructure information security is analyzed. The cryptographic problems in cloudy infrastructures are chosen; the appropriate protocols are investigated; the appropriate mathematical problems
Konstantin Grigorevich Kogos   +2 more
doaj  

A “Tech First” Approach to Foreign Policy? The Three Meanings of Tech Diplomacy

open access: yesGlobal Policy, EarlyView.
ABSTRACT Scholars have recently argued that international politics is plagued by instability as the world rapidly transitions from one crisis to another. This state of “Permacrisis,” or permanent crises between states, is driven by technological innovations which create new kinds of crises and drive competitions between adversarial states.
Ilan Manor
wiley   +1 more source

Blockchain technology disruptions: Exploring accounting and auditing academics and practitioners' perception

open access: yesAccounting &Finance, EarlyView.
Abstract This study explores the practical impact of blockchain technology (BCT), which contrasts strongly with literature that has predominantly hypothesised BCT's potential to disrupt accounting practice. We interviewed 44 practitioners and academics with knowledge of BCT across 13 countries and industries.
Musbaudeen Titilope Oladejo   +3 more
wiley   +1 more source

Cryptographic Protocols in Wireless Sensor Networks: A Critical Review

open access: yesProceedings, 2017
Wireless sensor networks (WSNs) play a fundamental role in new paradigms such as the Internet of Everything or the Industry 4.0. [...]
Angel Martin del Rey   +1 more
doaj   +1 more source

Between Cryptocurrencies' Risk and Crypto Environmental Attention: The Crypto Environment Attention Index and Volatility in the Cryptocurrencies Market Nexus

open access: yesBusiness Ethics, the Environment &Responsibility, EarlyView.
ABSTRACT This study investigates the impact of environmental attention on cryptocurrency market volatility by introducing the Crypto Environmental Attention Index (CEAI), a new metric inspired by Wang et al. (2022) and constructed using daily web search data.
Ines Ghazouani   +2 more
wiley   +1 more source

A Generic Security Proof for Quantum Key Distribution

open access: yes, 2004
Quantum key distribution allows two parties, traditionally known as Alice and Bob, to establish a secure random cryptographic key if, firstly, they have access to a quantum communication channel, and secondly, they can exchange classical public messages ...
Christandl, Matthias   +2 more
core  

Home - About - Disclaimer - Privacy