Results 51 to 60 of about 8,550 (197)
Bloom filters (BFs) and homomorphic encryption (HE) are prominent techniques used to design biometric template protection (BTP) schemes that aim to protect sensitive biometric information during storage and biometric comparison.
Amina Bassit +3 more
doaj +1 more source
Smart meter (SM): Collect the data of users' electricity consumption periodically, and preprocess the noise reduction by using the Robust Local Weighted Regression algorithm, then encrypt the private data in it by Boneh‐Goh‐Nissim homomorphic encryption, and submit the encrypted private data to the fog node.
Jiangtao Guo +5 more
wiley +1 more source
SUMMARY Self‐incompatibility (SI) is the single most important mechanism utilized by flowering plants to avoid self‐fertilization, thus preventing inbreeding and promoting outcrossing. Many plant SI systems are genetically controlled by a multi‐allelic S‐locus, containing two tightly linked genes that encode the female and male S‐determinants.
Zongcheng Lin +2 more
wiley +1 more source
This paper presents an integrated AI‐driven cardiovascular platform unifying multimodal data, predictive analytics, and real‐time monitoring. It demonstrates how artificial intelligence—from deep learning to federated learning—enables early diagnosis, precision treatment, and personalized rehabilitation across the full disease lifecycle, promoting a ...
Mowei Kong +4 more
wiley +1 more source
Data privacy preservation in MAC aware Internet of things with optimized key generation
Recently, the progression in Internet of Thing (IoT) has extensively influenced the model of wireless networking. As numerous wireless devices were emerged, the new Medium Access Control (MAC) and routing protocols has been introduced for assuring the ...
G. Kalyani, Shilpa Chaudhari
doaj +1 more source
This study presents a dual‐layered anonymization model combining BioClinicalBERT and polyalphabetic cipher to accurately identify and protect sensitive healthcare data. It achieves strong F1 scores while maintaining data utility, enabling privacy‐preserving clinical research compliant with GDPR and HIPAA regulations.
Deblina Mazumder Setu +3 more
wiley +1 more source
FRAST: TFHE-Friendly Cipher Based on Random S-Boxes
A transciphering framework, also known as hybrid homomorphic encryption, is a practical method of combining a homomorphic encryption (HE) scheme with a symmetric cipher in the client-server model to reduce computational and communication overload on the
Mingyu Cho +5 more
doaj +1 more source
Privacy Protection Optimization in Federated Learning [PDF]
Federated learning has emerged as a promising distributed machine learning paradigm that enables collaborative model training while preserving data privacy.
Zhou Xinyi
doaj +1 more source
ABSTRACT Global municipal solid waste generation is projected to exceed 3.8 billion tonnes annually by 2050. This makes the need for smart, inclusive, and scalable waste valorization systems more urgent than ever. This review critically explores the shift from conventional waste management to intelligent, technology‐driven solutions aligned with ...
Segun E. Ibitoye +8 more
wiley +1 more source
Secure and efficient two-party ECDSA signature scheme
To solve the easy disclosure of signature private key and excessive concentration of signature rights, a secure and efficient two-party ECDSA signature scheme was proposed for the blockchain based network trading systems.By pre-computing one-time pad ...
Jing WANG, Libing WU, Min LUO, Debiao HE
doaj +2 more sources

