Results 11 to 20 of about 26,049,904 (376)
Blockchain enabled data security in vehicular networks. [PDF]
Recently, researchers have applied blockchain technology in vehicular networks to take benefit of its security features, such as confidentiality, authenticity, immutability, integrity, and non-repudiation.
Sehar NU +6 more
europepmc +2 more sources
Metaverse in Healthcare Integrated with Explainable AI and Blockchain: Enabling Immersiveness, Ensuring Trust, and Providing Patient Data Security. [PDF]
Digitization and automation have always had an immense impact on healthcare. It embraces every new and advanced technology. Recently the world has witnessed the prominence of the metaverse which is an emerging technology in digital space.
Ali S +8 more
europepmc +2 more sources
Cloud data security and various cryptographic algorithms
Cloud computing has spread widely among different organizations due to its advantages, such as cost reduction, resource pooling, broad network access, and ease of administration.
Yahia Alemami +3 more
semanticscholar +1 more source
The smart grid idea was implemented as a modern interpretation of the traditional power grid to find out the most efficient way to combine renewable energy and storage technologies.
M. Hasan +7 more
semanticscholar +1 more source
Cloud computing is a rapidly expanding field. It allows users to access computer system resources as needed, particularly data storage and computational power, without managing them directly.
Rose Adee, H. Mouratidis
semanticscholar +1 more source
Analyzing the Big Data Security Through a Unified Decision-Making Approach
The use of cloud services, web-based software systems, the Internet of Things (IoT), Machine Learning (ML), Artificial Intelligence (AI), and other wireless sensor devices in the health sector has resulted in significant advancements and benefits.
Abdulaziz Attaallah +5 more
semanticscholar +1 more source
A New Dynamic Substitution Box for Data Security using an Innovative Chaotic Map
As the motivations and capabilities of threat actors continue to evolve, providing data security has become more important than ever. For this purpose, different ciphers using various techniques are being developed.
A. Manzoor +2 more
semanticscholar +1 more source
Encryption Techniques for Smart Systems Data Security Offloaded to the Cloud
With technological advancement, cloud computing paradigms are gaining massive popularity in the ever-changing technological advancement. The main objective of the cloud computing system is to provide on-demand storage and computing resources to the users
M. B. Qureshi +6 more
semanticscholar +1 more source
Towards Big Data Security Framework by Leveraging Fragmentation and Blockchain Technology
The world is facing a growth in the amount and variety of data generated by both users and machines. Despite the exponential increases, the tools and technologies developed to manage these data volumes are not intended to meet security and data ...
Hanan E. Alhazmi +2 more
semanticscholar +1 more source
Healthcare Data Security Using IoT Sensors Based on Random Hashing Mechanism
Providing security to the healthcare data stored in an IoT-cloud environment is one of the most challenging and demanding tasks in recent days. Because the IoT-cloud framework is constructed with an enormous number of sensors that are used to generate a ...
A. Khadidos +4 more
semanticscholar +1 more source

