Results 201 to 210 of about 6,859 (261)

Blockchain‐Enabled Privacy‐Preserving Access Control for EHRs Sharing With Optimized User and Attribute Revocation

open access: yesIET Information Security, Volume 2026, Issue 1, 2026.
Electronic health records (EHRs) have become a crucial application in cloud computing environments, necessitating advanced privacy‐preserving access control mechanisms. Ciphertext policy attribute‐based encryption (CP‐ABE) is a widely recognized solution for secure access control in outsourced data environments.
Khanadech Worapaluk   +2 more
wiley   +1 more source

Directed Acyclic Graph‐Based Blockchain Performance Analysis and Its Secure Operation in Opportunistic Networks

open access: yesIET Software, Volume 2026, Issue 1, 2026.
Directed acyclic graph (DAG)‐based blockchain is a promising paradigm of a blockchain system. During DAG‐based consensus processes, nodes generate blocks in parallel, as well as voting YES on the previous blocks. It makes the DAG‐based blockchain a performance advantage in terms of confirmation delay and transaction throughput.
Ruilin Lai   +6 more
wiley   +1 more source

Design and Development of a Blockchain‐Enabled Decentralized Framework for Academic Microcredentials

open access: yesIET Software, Volume 2026, Issue 1, 2026.
Traditional higher education faces significant challenges, including rising costs, inflexibility, and a disconnect from workforce demands, while current credentialing systems are often centralized and vulnerable to fraud. Microcredentials have emerged as a solution, yet they lack integration into formal degree pathways and face issues with recognition ...
Abrar Mahbub Tanim   +4 more
wiley   +1 more source

A Private Blockchain and IPFS‐Based Secure and Decentralized Framework for People Surveillance via Deep Learning Techniques

open access: yesIET Software, Volume 2026, Issue 1, 2026.
The modern metropolis essentially demands the use of state‐of‐the‐art, real‐time surveillance systems, which should be reliable, scalable, and respectful of privacy at the same time. Critical shortcomings in traditional architectures are single points of failure, poor scalability, frequent data breaches, and inadequately managed privacy.
Shihab Sarar   +4 more
wiley   +1 more source

Blockchain-enabled quality by design system for clinical trials. [PDF]

open access: yesFront Med (Lausanne)
Vatankhah Barenji R, Hariry RE.
europepmc   +1 more source

Carbon pathways and trophic attributes are conserved in carnivorous reef fishes across a major human disturbance gradient

open access: yesJournal of Animal Ecology, Volume 95, Issue 1, Page 39-53, January 2026.
Our research leverages a natural, ecosystem‐scale experiment and cutting‐edge molecular isotope approaches to reveal that coral reef food web structure and energy flow can remain consistent across a gradient of human disturbance. Abstract Habitat degradation and overexploitation are key drivers of biodiversity loss globally.
Matthew D. Ramirez   +4 more
wiley   +1 more source

Home - About - Disclaimer - Privacy