Results 41 to 50 of about 26,049,904 (376)

Dynamic AES Encryption and Blockchain Key Management: A Novel Solution for Cloud Data Security

open access: yesIEEE Access
In the rapidly evolving realm of cloud computing security, this paper introduces an innovative solution to address persistent challenges. The proliferation of cloud technology has brought forth heightened concerns regarding data security, necessitating ...
Mohammed Y. Shakor   +4 more
semanticscholar   +1 more source

Time-Sensitive and Sybil-Proof Incentive Mechanisms for Mobile Crowdsensing via Social Network

open access: yesIEEE Access, 2018
Mobile crowdsensing (MCS) has become a popular and promising paradigm in various sensing applications in urban scenarios. In recent years, some social network-based MCS systems, which utilizing the social relationship to recruit participants or perform ...
Lingyun Jiang   +5 more
doaj   +1 more source

Secret Sharing for Cloud Data Security

open access: yes, 2017
Cloud computing helps reduce costs, increase business agility and deploy solutions with a high return on investment for many types of applications. However, data security is of premium importance to many users and often restrains their adoption of cloud ...
Attasena, Varunya   +2 more
core   +1 more source

Intelligent Video Data Security: A Survey and Open Challenges

open access: yesIEEE Access, 2021
A range of video contents and technology have provided convenience to humans, with real-time video applications—such as surveillance applications—able to contribute to increasing public safety by reducing physical crimes.
Jin-Yong Yu, Yujun Kim, Young-Gab Kim
semanticscholar   +1 more source

Leveraging Artificial Intelligence to Enhance Data Security and Combat Cyber Attacks

open access: yesJournal of Artificial Intelligence General science (JAIGS) ISSN:3006-4023
This research paper examines the potential of artificial intelligence (AI) in strengthening data security and mitigating the growing threat of cyber-attacks.
Yijie Weng, Jianhao Wu
semanticscholar   +1 more source

Multi-Features Refinement and Aggregation for Medical Brain Segmentation

open access: yesIEEE Access, 2020
Due to the complexity of the anatomical structure for human organs, medical image segmentation is always a challenging computer vision task. The Convolutional Neural Network (CNN) requires a rich feature representation, which not only needs the ...
Dongyuan Wu   +4 more
doaj   +1 more source

Digital Signature Security in Data Communication

open access: yes, 2018
Authenticity of access in very information are very important in the current era of Internet-based technology, there are many ways to secure information from irresponsible parties with various security attacks, some of technique can use for defend attack
Abdillah, Leon Andretti   +8 more
core   +1 more source

Enhancing Data Security through Advanced Cryptographic Techniques

open access: yesInternational journal of computer science and mobile computing
In a time when digital technology is everywhere, it is essential to have strong data security, This study addresses data security, focusing on advanced encryption methods, A secure connection, or encryption, protects private data from tampering and ...
M. Abudalou
semanticscholar   +1 more source

Enhancing Privacy and Data Security across Healthcare Applications Using Blockchain and Distributed Ledger Concepts

open access: yesHealthcare, 2020
Nowadays, blockchain is developing as a secure and trustworthy platform for secure information sharing in areas of application like banking, supply chain management, food industry, energy, the Internet, and medical services.
Haibing Liu   +2 more
semanticscholar   +1 more source

Understanding the infection severity and epidemiological characteristics of mpox in the UK

open access: yesNature Communications
In May 2022, individuals infected with the monkeypox virus were detected in the UK without clear travel links to endemic areas. Understanding the clinical characteristics and infection severity of mpox is necessary for effective public health policy. The
Thomas Ward   +5 more
doaj   +1 more source

Home - About - Disclaimer - Privacy