Results 11 to 20 of about 22,394,325 (191)

Metaverse in Healthcare Integrated with Explainable AI and Blockchain: Enabling Immersiveness, Ensuring Trust, and Providing Patient Data Security

open access: yesItalian National Conference on Sensors, 2023
Digitization and automation have always had an immense impact on healthcare. It embraces every new and advanced technology. Recently the world has witnessed the prominence of the metaverse which is an emerging technology in digital space.
Sikandar Ali   +8 more
semanticscholar   +1 more source

Blockchain enabled data security in vehicular networks

open access: yesScientific Reports, 2023
Recently, researchers have applied blockchain technology in vehicular networks to take benefit of its security features, such as confidentiality, authenticity, immutability, integrity, and non-repudiation.
Naseem us Sehar   +6 more
semanticscholar   +1 more source

Cloud data security and various cryptographic algorithms

open access: yesInternational Journal of Electrical and Computer Engineering (IJECE), 2023
Cloud computing has spread widely among different organizations due to its advantages, such as cost reduction, resource pooling, broad network access, and ease of administration.
Yahia Alemami   +3 more
semanticscholar   +1 more source

A Dynamic Four-Step Data Security Model for Data in Cloud Computing Based on Cryptography and Steganography

open access: yesItalian National Conference on Sensors, 2022
Cloud computing is a rapidly expanding field. It allows users to access computer system resources as needed, particularly data storage and computational power, without managing them directly.
Rose Adee, H. Mouratidis
semanticscholar   +1 more source

Analyzing the Big Data Security Through a Unified Decision-Making Approach

open access: yesIntelligent Automation and Soft Computing, 2022
The use of cloud services, web-based software systems, the Internet of Things (IoT), Machine Learning (ML), Artificial Intelligence (AI), and other wireless sensor devices in the health sector has resulted in significant advancements and benefits.
Abdulaziz Attaallah   +5 more
semanticscholar   +1 more source

A New Dynamic Substitution Box for Data Security using an Innovative Chaotic Map

open access: yesIEEE Access, 2022
As the motivations and capabilities of threat actors continue to evolve, providing data security has become more important than ever. For this purpose, different ciphers using various techniques are being developed.
A. Manzoor, A. Zahid, Malik Tahir Hassan
semanticscholar   +1 more source

On the Security of Individual Data [PDF]

open access: yesAnnals of Mathematics and Artificial Intelligence, 2004
We will consider the following problem in this paper: Assume that there are $$n$$ numerical data $$\{x_1,x_2,\ldots,x_n\}$$ (like salaries of $$n$$ individuals) stored in a database and some subsums of these numbers are made public or just available for persons not eligible to learn the original data.
Demetrovics, János   +2 more
openaire   +3 more sources

Enhanced Data Security of Communication System Using Combined Encryption and Steganography

open access: yesInternational Journal of Interactive Mobile Technologies, 2021
Data security has become a paramount necessity and more obligation in daily life. Most of our systems can be hacked, and it causes very high risks to our confidential files inside the systems.
H. Alrikabi, H. Hazim
semanticscholar   +1 more source

A survey on healthcare data security in wireless body area networks

open access: yesJournal of Ambient Intelligence and Humanized Computing, 2021
Advances in remote interchanges, the internet of nano things have empowered the wireless body area networks (WBAN) to end up a promising systems of networking standard.
Tallat Jabeen, Humaira Ashraf, A. Ullah
semanticscholar   +1 more source

Data Security

open access: yesACM Computing Surveys, 1979
The rising abuse of computers and increasing threat to personal privacy through data banks have stimulated much interest in the technical safeguards for data. There are four kinds of safeguards, each related to but distinct from the others. Access controls regulate which users may enter the system and subsequently which data sets an active user may ...
Denning, Dorothy E., Denning, Peter J.
openaire   +5 more sources

Home - About - Disclaimer - Privacy