Results 91 to 100 of about 196,760 (255)
Artificial intelligence and big data platforms are transforming oncology clinical practice. This review proposes a physician‐centered framework to integrate AI tools with real‐world data, supporting more precise diagnosis, individualized treatment, and improved patient outcomes.
Binliang Liu +7 more
wiley +1 more source
This paper addresses the critical need for secure diploma generation and verification in higher education by proposing and detailing the practical implementation of DIAR, a blockchain‐based framework. DIAR leverages blockchain's inherent security features and non‐fungible tokens for efficient, cost‐effective and tamper‐proof credential management ...
Avni Rustemi, Fisnik Dalipi
wiley +1 more source
Private Multi-party Matrix Multiplication and Trust Computations
This paper deals with distributed matrix multiplication. Each player owns only one row of both matrices and wishes to learn about one distinct row of the product matrix, without revealing its input to the other players.
Dumas, Jean-Guillaume +3 more
core +4 more sources
Privacy-Preserving Outsourced Logistic Regression on Encrypted Data from Homomorphic Encryption [PDF]
Xiaopeng Yu +4 more
openalex +1 more source
Design and Development of a Blockchain‐Enabled Decentralized Framework for Academic Microcredentials
Traditional higher education faces significant challenges, including rising costs, inflexibility, and a disconnect from workforce demands, while current credentialing systems are often centralized and vulnerable to fraud. Microcredentials have emerged as a solution, yet they lack integration into formal degree pathways and face issues with recognition ...
Abrar Mahbub Tanim +4 more
wiley +1 more source
The modern metropolis essentially demands the use of state‐of‐the‐art, real‐time surveillance systems, which should be reliable, scalable, and respectful of privacy at the same time. Critical shortcomings in traditional architectures are single points of failure, poor scalability, frequent data breaches, and inadequately managed privacy.
Shihab Sarar +4 more
wiley +1 more source
Data security for internet plus in public cloud
“Internet plus” has given birth to many new economic forms and business models,the public cloud faces a serious security challenges.The security of public cloud data was studied and the research ideas were put forward.Firstly,the concept of homomorphic ...
Yongjian WANG +3 more
doaj +2 more sources
Secure federated learning via neural cryptography with homomorphic operations
This study examines neural cryptography with homomorphic operations as an alternative secure aggregation method for federated learning (FL). It proposes a novel neural cryptographic system supporting homomorphic addition on fixed-point encrypted data ...
Espen Sele +3 more
doaj +1 more source
Shift-Type Homomorphic Encryption and Its Application to Fully Homomorphic Encryption
This work addresses the characterization of homomorphic encryption schemes both in terms of security and design. In particular, we are interested in currently existing fully homomorphic encryption (FHE) schemes and their common structures and security.
Armknecht, Frederik +2 more
openaire +3 more sources
Medical Data as a Key Asset in the Digital Health Era: A Framework for Challenges and Strategies
By conducting case studies and comparative analysis from a global perspective, this study develops the practical framework of Medical Data Element Ecosystem (MDEE)—one that facilitates MDEE construction by guiding actions, informing policy‐making, and enabling stakeholder engagement.
Jian Wang +10 more
wiley +1 more source

