Results 131 to 140 of about 154,141 (333)
PARSHA-256 – A New Parallelizable Hash Function and a Multithreaded Implementation [PDF]
Pinakpani Pal, Palash Sarkar
openalex +1 more source
A secured cloud‐medical data sharing with A‐BRSA and Salp ‐Ant Lion Optimisation Algorithm
Abstract Sharing medical data among healthcare providers, researchers, and patients is crucial for efficient healthcare services. Cloud‐assisted smart healthcare (s‐healthcare) systems have made it easier to store EHRs effectively. However, the traditional encryption algorithms used to secure this data can be vulnerable to attacks if the encryption key
Adel Binbusayyis +7 more
wiley +1 more source
Abstract The Internet of Things (IoT) in deploying robotic sprayers for pandemic‐associated disinfection and monitoring has garnered significant attention in recent research. The authors introduce a novel architectural framework designed to interconnect smart monitoring robotic devices within healthcare facilities using narrowband Internet of Things ...
Md Motaharul Islam +9 more
wiley +1 more source
Refined repetitive sequence searches utilizing a fast hash function and cross species information retrievals [PDF]
Jeff Reneker, Chi‐Ren Shyu
openalex +1 more source
Abstract Data is the key element that runs the modern society. Large amounts of data are being released day by day as a result of many activities. The digital data is transferred through the Internet which may be vulnerable to attacks while transmitting. Especially, the medical data is observed to be of at most importance.
Rupa Ch +4 more
wiley +1 more source
ABSTRACT The 100‐kernel weight of corn seed is a crucial metric for assessing corn quality, and the current measurement means mostly involve manual counting of kernels followed by weighing on a balance, which is labour‐intensive and time‐consuming. Aiming to address the problem of low efficiency in measuring the 100‐kernel weight of corn seeds, this ...
Helong Yu +4 more
wiley +1 more source
ABSTRACT Medical images play a crucial role in diagnosis, treatment procedures and overall healthcare. Nevertheless, they also pose substantial risks to patient confidentiality and safety. Safeguarding the confidentiality of patients' data has become an urgent and practical concern.
Mohamed Meselhy Eltoukhy +3 more
wiley +1 more source
Revocable policy-based chameleon hash using lattices
A chameleon hash function is a type of hash function that involves a trapdoor to help find collisions, i.e., it allows the rewriting of a message without modifying the hash.
Klamti Jean Belo, Hasan Mohammed Anwarul
doaj +1 more source
A Security Analysis of Double-Block-Length Hash Functions with the Rate 1 [PDF]
Shoichi Hirose
openalex +1 more source
PointGeo: Geometry Transformer for Point Cloud Analysis
ABSTRACT Point cloud processing plays a crucial role in tasks such as point cloud classification, partial segmentation and semantic segmentation. However, existing processing frameworks are constrained by several challenges, such as recognising features in irregular and complex spatial structures, large attention parameter volumes and limitations in ...
Li An +5 more
wiley +1 more source

