Results 61 to 70 of about 1,678 (176)
IoT systems consist of Hardware/Software systems (e.g., sensors) that are embedded in a physical world, networked and that interact with complex software platforms.
Johannes Kölsch +3 more
doaj +1 more source
A Hybrid Encryption Framework for Secure and Real‐Time Vehicular Communications
ABSTRACT The rapid expansion of Vehicular Ad Hoc Networks (VANETs) has amplified concerns regarding data security, integrity, and privacy. This paper presents SECURIDE, a Secure Intelligent Data Exchange for Connected Vehicles that provides a comprehensive encryption–decryption framework for safeguarding multimedia data and communication channels in ...
Muhammad Usama, Muhammad Usman Hadi
wiley +1 more source
Multi-Functional Homomorphic Encryption Method Based on Crowd Sensing Networks
In response to the security and privacy issues associated with sensing devices in contemporary crowd sensing systems, the paper proposes a crowd sensing networks method based on the MFHE (the Multi-Functional Homomorphic Encryption) architecture.
Hui Chen +10 more
doaj +1 more source
This review examines the integration of federated learning (FL) in the Internet of Medical Things (IoMT), enhanced by 5G/6G technologies, to improve healthcare systems with decentralized data processing, enhanced privacy, reduced latency, and efficient resource utilization, while addressing emerging challenges and future research directions.
Abdul Ahad +6 more
wiley +1 more source
Identity-Based Matrix (Level) Fully Homomorphic Encryption Scheme
With the development of quantum theory, traditional encryption algorithms are facing enormous challenges. Once quantum computers are available, existing encryption systems will no longer be secure.
CHEN Hong, HUANG Jie, CHEN Honglin, WANG Runting, XIAO Chenglong, GUO Pengfei, JIN Haibo
doaj +1 more source
Edge Computing in Healthcare Using Machine Learning: A Systematic Literature Review
Three key parts of our review. This review examines recent research on integrating machine learning with edge computing in healthcare. It is structured around three key parts: the demographic characteristics of the selected studies; the themes, tools, motivations, and data sources; and the key limitations, challenges, and future research directions ...
Amir Mashmool +7 more
wiley +1 more source
Artificial intelligence and big data platforms are transforming oncology clinical practice. This review proposes a physician‐centered framework to integrate AI tools with real‐world data, supporting more precise diagnosis, individualized treatment, and improved patient outcomes.
Binliang Liu +7 more
wiley +1 more source
Enhancing Food Safety in the Cold Chain Through Internet of Things and Artificial Intelligence
ABSTRACT Effective cold chain management is crucial for ensuring food safety, but traditional monitoring approaches remain reactive and fragmented. Industry 4.0 technologies, such as the Internet of Things (IoT) and artificial intelligence (AI), offer transformative potential for real‐time tracking, automation, and predictive analytics.
Wagner Augusto Müller +2 more
wiley +1 more source
Fully homomorphic encryption scheme from RLWE
Based on the somewhat homomorphic scheme of Kristin Lauter et al.a new technique,called Relinearization with key switching was presented.Combining this technique with modulus switching,a (leveled) fully homomorphic encryption scheme without bootstrapping
Dian-hua TANG +4 more
doaj +2 more sources
A Verifiable Fully Homomorphic Encryption Scheme for Cloud Computing Security
Performing smart computations in a context of cloud computing and big data is highly appreciated today. It allows customers to fully benefit from cloud computing capacities (such as processing or storage) without losing confidentiality of sensitive data.
Ahmed EL-YAHYAOUI +1 more
doaj +1 more source

