Results 151 to 160 of about 65,060 (255)

6G Wireless Communications Enabled by the Blockchain: Privacy and Middleware Architecture

open access: yesInternational Journal of Distributed Sensor Networks, Volume 2026, Issue 1, 2026.
6G is transformational and brings revolutionary innovations in virtually all sectors, such as healthcare, autonomous systems, and manufacturing, through ultralow latency, massive connection, and far superior computing capabilities than any previous generation.
Moumita Chanda   +4 more
wiley   +1 more source

Parameter Sensitivity Test and Audio Encryption Scheme Design for Multimedia Information Security

open access: yesInternational Journal of Digital Multimedia Broadcasting, Volume 2026, Issue 1, 2026.
With the continuous development of information technology, multimedia information faces many security threats. To realize efficient multimedia information processing under the premise of guaranteeing information security, this research analyzes and extracts the parameters of different kinds of information in view of the fact that each of them has ...
Ming Yin, Shi Tang, Deepali
wiley   +1 more source

Enhanced IoT Security: Blockchain, Cryptography, and CNN Integration for Mask Detection

open access: yesJournal of Electrical and Computer Engineering, Volume 2026, Issue 1, 2026.
Security concerns have become paramount, especially with the increasing reliance on facial recognition technology for identity verification. The use of masks, while essential for health protection, poses a significant challenge for these systems, hindering accurate identification.
Imen Hagui   +3 more
wiley   +1 more source

A Secure and Robust Blockchain‐Based Medical Image Encryption Approach Using Lorenz Chaotic System

open access: yesJournal of Sensors, Volume 2026, Issue 1, 2026.
Keeping medical images confidential while transmitting is crucial, especially in an open networking environment. One effective approach is blockchain‐based encryption, which provides strong security for sensitive healthcare data. To ensure the greatest levels of medical data integrity and authenticity, our proposed scheme employs a unique Lorenz ...
Fahima Hajjej   +4 more
wiley   +1 more source

Home - About - Disclaimer - Privacy