Results 41 to 50 of about 26,049,904 (376)
Dynamic AES Encryption and Blockchain Key Management: A Novel Solution for Cloud Data Security
In the rapidly evolving realm of cloud computing security, this paper introduces an innovative solution to address persistent challenges. The proliferation of cloud technology has brought forth heightened concerns regarding data security, necessitating ...
Mohammed Y. Shakor +4 more
semanticscholar +1 more source
Time-Sensitive and Sybil-Proof Incentive Mechanisms for Mobile Crowdsensing via Social Network
Mobile crowdsensing (MCS) has become a popular and promising paradigm in various sensing applications in urban scenarios. In recent years, some social network-based MCS systems, which utilizing the social relationship to recruit participants or perform ...
Lingyun Jiang +5 more
doaj +1 more source
Secret Sharing for Cloud Data Security
Cloud computing helps reduce costs, increase business agility and deploy solutions with a high return on investment for many types of applications. However, data security is of premium importance to many users and often restrains their adoption of cloud ...
Attasena, Varunya +2 more
core +1 more source
Intelligent Video Data Security: A Survey and Open Challenges
A range of video contents and technology have provided convenience to humans, with real-time video applications—such as surveillance applications—able to contribute to increasing public safety by reducing physical crimes.
Jin-Yong Yu, Yujun Kim, Young-Gab Kim
semanticscholar +1 more source
Leveraging Artificial Intelligence to Enhance Data Security and Combat Cyber Attacks
This research paper examines the potential of artificial intelligence (AI) in strengthening data security and mitigating the growing threat of cyber-attacks.
Yijie Weng, Jianhao Wu
semanticscholar +1 more source
Multi-Features Refinement and Aggregation for Medical Brain Segmentation
Due to the complexity of the anatomical structure for human organs, medical image segmentation is always a challenging computer vision task. The Convolutional Neural Network (CNN) requires a rich feature representation, which not only needs the ...
Dongyuan Wu +4 more
doaj +1 more source
Digital Signature Security in Data Communication
Authenticity of access in very information are very important in the current era of Internet-based technology, there are many ways to secure information from irresponsible parties with various security attacks, some of technique can use for defend attack
Abdillah, Leon Andretti +8 more
core +1 more source
Enhancing Data Security through Advanced Cryptographic Techniques
In a time when digital technology is everywhere, it is essential to have strong data security, This study addresses data security, focusing on advanced encryption methods, A secure connection, or encryption, protects private data from tampering and ...
M. Abudalou
semanticscholar +1 more source
Nowadays, blockchain is developing as a secure and trustworthy platform for secure information sharing in areas of application like banking, supply chain management, food industry, energy, the Internet, and medical services.
Haibing Liu +2 more
semanticscholar +1 more source
Understanding the infection severity and epidemiological characteristics of mpox in the UK
In May 2022, individuals infected with the monkeypox virus were detected in the UK without clear travel links to endemic areas. Understanding the clinical characteristics and infection severity of mpox is necessary for effective public health policy. The
Thomas Ward +5 more
doaj +1 more source

