Results 51 to 60 of about 8,550 (197)

Hybrid biometric template protection: Resolving the agony of choice between bloom filters and homomorphic encryption

open access: yesIET Biometrics, 2022
Bloom filters (BFs) and homomorphic encryption (HE) are prominent techniques used to design biometric template protection (BTP) schemes that aim to protect sensitive biometric information during storage and biometric comparison.
Amina Bassit   +3 more
doaj   +1 more source

Data Clustering Method for Fault‐Tolerant Privacy Protection of Smart Grid Based on BGN Homomorphic Encryption Algorithm

open access: yesEngineering Reports, Volume 8, Issue 4, April 2026.
Smart meter (SM): Collect the data of users' electricity consumption periodically, and preprocess the noise reduction by using the Robust Local Weighted Regression algorithm, then encrypt the private data in it by Boneh‐Goh‐Nissim homomorphic encryption, and submit the encrypted private data to the fog node.
Jiangtao Guo   +5 more
wiley   +1 more source

Several plant self‐incompatibility systems may be controlled by atypical receptor–ligand interactions

open access: yesThe Plant Journal, Volume 126, Issue 1, April 2026.
SUMMARY Self‐incompatibility (SI) is the single most important mechanism utilized by flowering plants to avoid self‐fertilization, thus preventing inbreeding and promoting outcrossing. Many plant SI systems are genetically controlled by a multi‐allelic S‐locus, containing two tightly linked genes that encode the female and male S‐determinants.
Zongcheng Lin   +2 more
wiley   +1 more source

Building an Intelligent Cardiovascular System Platform: Embedding Artificial Intelligence across All Facets of Cardiovascular Medicine

open access: yesAdvanced Intelligent Systems, Volume 8, Issue 3, March 2026.
This paper presents an integrated AI‐driven cardiovascular platform unifying multimodal data, predictive analytics, and real‐time monitoring. It demonstrates how artificial intelligence—from deep learning to federated learning—enables early diagnosis, precision treatment, and personalized rehabilitation across the full disease lifecycle, promoting a ...
Mowei Kong   +4 more
wiley   +1 more source

Data privacy preservation in MAC aware Internet of things with optimized key generation

open access: yesJournal of King Saud University: Computer and Information Sciences, 2022
Recently, the progression in Internet of Thing (IoT) has extensively influenced the model of wireless networking. As numerous wireless devices were emerged, the new Medium Access Control (MAC) and routing protocols has been introduced for assuring the ...
G. Kalyani, Shilpa Chaudhari
doaj   +1 more source

Towards Enhancing Healthcare Data Privacy: Integrating BioClinicalBERT With Polyalphabetic Cipher for Entity Recognition and Anonymization

open access: yesEngineering Reports, Volume 8, Issue 3, March 2026.
This study presents a dual‐layered anonymization model combining BioClinicalBERT and polyalphabetic cipher to accurately identify and protect sensitive healthcare data. It achieves strong F1 scores while maintaining data utility, enabling privacy‐preserving clinical research compliant with GDPR and HIPAA regulations.
Deblina Mazumder Setu   +3 more
wiley   +1 more source

FRAST: TFHE-Friendly Cipher Based on Random S-Boxes

open access: yesIACR Transactions on Symmetric Cryptology
A transciphering framework, also known as hybrid homomorphic encryption, is a practical method of combining a homomorphic encryption (HE) scheme with a symmetric cipher in the client-server model to reduce computational and communication overload on the
Mingyu Cho   +5 more
doaj   +1 more source

Privacy Protection Optimization in Federated Learning [PDF]

open access: yesITM Web of Conferences
Federated learning has emerged as a promising distributed machine learning paradigm that enables collaborative model training while preserving data privacy.
Zhou Xinyi
doaj   +1 more source

Smart Waste, Smarter World: Exploring Waste Types, Trends, and Tech‐Driven Valorization Through Artificial Intelligence, Internet of Things, and Blockchain

open access: yesSustainable Development, Volume 34, Issue S2, Page 132-153, March 2026.
ABSTRACT Global municipal solid waste generation is projected to exceed 3.8 billion tonnes annually by 2050. This makes the need for smart, inclusive, and scalable waste valorization systems more urgent than ever. This review critically explores the shift from conventional waste management to intelligent, technology‐driven solutions aligned with ...
Segun E. Ibitoye   +8 more
wiley   +1 more source

Secure and efficient two-party ECDSA signature scheme

open access: yesTongxin xuebao, 2021
To solve the easy disclosure of signature private key and excessive concentration of signature rights, a secure and efficient two-party ECDSA signature scheme was proposed for the blockchain based network trading systems.By pre-computing one-time pad ...
Jing WANG, Libing WU, Min LUO, Debiao HE
doaj   +2 more sources

Home - About - Disclaimer - Privacy