Results 191 to 200 of about 123,825 (281)
A Security-Enhanced Certificateless Aggregate Authentication Protocol with Revocation for Wireless Medical Sensor Networks. [PDF]
Fan Q, Wang Y, Li X.
europepmc +1 more source
Social media algorithms drive a hidden risk chain: over‐disclosure → behavioral fusion → targeted attacks. We propose a 128‐dim, law‐aware risk scoring model with Drools‐based dynamic alerts for universities. ABSTRACT As universities undergo accelerated digital transformation, social media algorithms—while streamlining campus services—have emerged as a
Weishu Ye, Zhi Li
wiley +1 more source
A novel analysis methodology for assessment of re-identification risks for the National Cancer Institute cancer registry privacy preserving record linkage technique. [PDF]
Kantarcioglu M +7 more
europepmc +1 more source
Science that speaks: The public face of physiology
Experimental Physiology, EarlyView.
Danny W. Walmsley +4 more
wiley +1 more source
The end stage of barrier estuary infill: Insights from Jack Smith Lake, Southeastern Australia
Infill model for the saline coastal lake estuary, Jack Smith Lake. Abstract Jack Smith Lake in southeastern Australia is an infilled saline coastal lake, disconnected from the ocean by a foredune barrier. This study explores the Holocene infill history of this estuary in order to understand the end‐stage evolution of barrier estuarine systems with ...
David M. Kennedy +6 more
wiley +1 more source
Sybil-resistant and privacy-preserving authentication based on short-term pseudonym for internet of vehicles. [PDF]
Zhang C +4 more
europepmc +1 more source
Blockchain for the Arts and Humanities
ABSTRACT As born‐digital cultural materials proliferate, the arts and humanities require infrastructures that guarantee provenance, authenticity, and equitable access. This paper delivers a comprehensive, critical survey of blockchain's potential and limits across the sector.
James O'Sullivan
wiley +1 more source
Industrial internet data management framework with blockchain integration for data integrity assurance and access control resolution. [PDF]
Han J +7 more
europepmc +1 more source
ABSTRACT Background and Aims Rising quantum hazards and flaws in conventional encryption make cloud‐based healthcare data security harder. Quantum‐Secure HealthChain, a new architecture using blockchain and quantum computing, improves medical data security, patient privacy, and data fidelity. Methods To prevent quantum attacks, the proposed system uses
Rajesh Bose +6 more
wiley +1 more source

