Results 11 to 20 of about 26,049,904 (376)

Blockchain enabled data security in vehicular networks. [PDF]

open access: yesSci Rep, 2023
Recently, researchers have applied blockchain technology in vehicular networks to take benefit of its security features, such as confidentiality, authenticity, immutability, integrity, and non-repudiation.
Sehar NU   +6 more
europepmc   +2 more sources

Metaverse in Healthcare Integrated with Explainable AI and Blockchain: Enabling Immersiveness, Ensuring Trust, and Providing Patient Data Security. [PDF]

open access: yesSensors (Basel), 2023
Digitization and automation have always had an immense impact on healthcare. It embraces every new and advanced technology. Recently the world has witnessed the prominence of the metaverse which is an emerging technology in digital space.
Ali S   +8 more
europepmc   +2 more sources

Cloud data security and various cryptographic algorithms

open access: yesInternational Journal of Electrical and Computer Engineering (IJECE), 2023
Cloud computing has spread widely among different organizations due to its advantages, such as cost reduction, resource pooling, broad network access, and ease of administration.
Yahia Alemami   +3 more
semanticscholar   +1 more source

Blockchain Technology on Smart Grid, Energy Trading, and Big Data: Security Issues, Challenges, and Recommendations

open access: yesWireless Communications and Mobile Computing, 2022
The smart grid idea was implemented as a modern interpretation of the traditional power grid to find out the most efficient way to combine renewable energy and storage technologies.
M. Hasan   +7 more
semanticscholar   +1 more source

A Dynamic Four-Step Data Security Model for Data in Cloud Computing Based on Cryptography and Steganography

open access: yesItalian National Conference on Sensors, 2022
Cloud computing is a rapidly expanding field. It allows users to access computer system resources as needed, particularly data storage and computational power, without managing them directly.
Rose Adee, H. Mouratidis
semanticscholar   +1 more source

Analyzing the Big Data Security Through a Unified Decision-Making Approach

open access: yesIntelligent Automation and Soft Computing, 2022
The use of cloud services, web-based software systems, the Internet of Things (IoT), Machine Learning (ML), Artificial Intelligence (AI), and other wireless sensor devices in the health sector has resulted in significant advancements and benefits.
Abdulaziz Attaallah   +5 more
semanticscholar   +1 more source

A New Dynamic Substitution Box for Data Security using an Innovative Chaotic Map

open access: yesIEEE Access, 2022
As the motivations and capabilities of threat actors continue to evolve, providing data security has become more important than ever. For this purpose, different ciphers using various techniques are being developed.
A. Manzoor   +2 more
semanticscholar   +1 more source

Encryption Techniques for Smart Systems Data Security Offloaded to the Cloud

open access: yesSymmetry, 2022
With technological advancement, cloud computing paradigms are gaining massive popularity in the ever-changing technological advancement. The main objective of the cloud computing system is to provide on-demand storage and computing resources to the users
M. B. Qureshi   +6 more
semanticscholar   +1 more source

Towards Big Data Security Framework by Leveraging Fragmentation and Blockchain Technology

open access: yesIEEE Access, 2022
The world is facing a growth in the amount and variety of data generated by both users and machines. Despite the exponential increases, the tools and technologies developed to manage these data volumes are not intended to meet security and data ...
Hanan E. Alhazmi   +2 more
semanticscholar   +1 more source

Healthcare Data Security Using IoT Sensors Based on Random Hashing Mechanism

open access: yesJ. Sensors, 2022
Providing security to the healthcare data stored in an IoT-cloud environment is one of the most challenging and demanding tasks in recent days. Because the IoT-cloud framework is constructed with an enormous number of sensors that are used to generate a ...
A. Khadidos   +4 more
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy