Results 151 to 160 of about 13,015 (291)

A secured cloud‐medical data sharing with A‐BRSA and Salp ‐Ant Lion Optimisation Algorithm

open access: yesCAAI Transactions on Intelligence Technology, EarlyView.
Abstract Sharing medical data among healthcare providers, researchers, and patients is crucial for efficient healthcare services. Cloud‐assisted smart healthcare (s‐healthcare) systems have made it easier to store EHRs effectively. However, the traditional encryption algorithms used to secure this data can be vulnerable to attacks if the encryption key
Adel Binbusayyis   +7 more
wiley   +1 more source

Attacks on hash functions and applications

open access: yes, 2012
Cryptografische hashfuncties, of simpelweg hashfuncties, zijn een van de belangrijkste bouwstenen binnen de cryptografie. Een hashfunctie is een algoritme dat voor elk willekeurig bericht een korte hash-waarde van een vast aantal bits (bv. 256 bits) berekent. Zulke hash-waarden worden gebruikt als een soort van vingerafdruk om het originele bericht mee
openaire   +4 more sources

Enabling pandemic‐resilient healthcare: Narrowband Internet of Things and edge intelligence for real‐time monitoring

open access: yesCAAI Transactions on Intelligence Technology, EarlyView.
Abstract The Internet of Things (IoT) in deploying robotic sprayers for pandemic‐associated disinfection and monitoring has garnered significant attention in recent research. The authors introduce a novel architectural framework designed to interconnect smart monitoring robotic devices within healthcare facilities using narrowband Internet of Things ...
Md Motaharul Islam   +9 more
wiley   +1 more source

Robust steganographic framework for securing sensitive healthcare data of telemedicine using convolutional neural network

open access: yesCAAI Transactions on Intelligence Technology, EarlyView.
Abstract Data is the key element that runs the modern society. Large amounts of data are being released day by day as a result of many activities. The digital data is transferred through the Internet which may be vulnerable to attacks while transmitting. Especially, the medical data is observed to be of at most importance.
Rupa Ch   +4 more
wiley   +1 more source

Robust Multi-property Combiners for Hash Functions Revisited [PDF]

open access: green, 2008
Marc Fischlin   +2 more
openalex   +1 more source

Hash functions in Cryptography

open access: yes, 2008
This thesis is concerned with giving both an overview of the application of hash functions in cryptography and a presentation of today's standard cryptographic hash functions. Cryptographic hash functions are a valuable tool in cryptography. They are applied in many areas of information security to provide protection of the authenticity of messages ...
openaire   +1 more source

Bat algorithm based on kinetic adaptation and elite communication for engineering problems

open access: yesCAAI Transactions on Intelligence Technology, EarlyView.
Abstract The Bat algorithm, a metaheuristic optimization technique inspired by the foraging behaviour of bats, has been employed to tackle optimization problems. Known for its ease of implementation, parameter tunability, and strong global search capabilities, this algorithm finds application across diverse optimization problem domains. However, in the
Chong Yuan   +6 more
wiley   +1 more source

Prospective association between evening circadian preference and academic functioning in adolescents: the role of daytime sleepiness

open access: yesJournal of Child Psychology and Psychiatry, Volume 64, Issue 1, Page 175-184, January 2023., 2023
Background There is growing evidence for the role of circadian factors in adolescents' sleep and academic adjustment, with greater evening preference being linked to poorer academic functioning. However, studies have yet to evaluate this association prospectively in adolescence, nor have studies examined daytime sleepiness as a putative mechanism ...
Joseph W. Fredrick   +3 more
wiley   +1 more source

Home - About - Disclaimer - Privacy