Results 61 to 70 of about 8,550 (197)

A Hybrid Encryption Framework for Secure and Real‐Time Vehicular Communications

open access: yesSECURITY AND PRIVACY, Volume 9, Issue 2, March/April 2026.
ABSTRACT The rapid expansion of Vehicular Ad Hoc Networks (VANETs) has amplified concerns regarding data security, integrity, and privacy. This paper presents SECURIDE, a Secure Intelligent Data Exchange for Connected Vehicles that provides a comprehensive encryption–decryption framework for safeguarding multimedia data and communication channels in ...
Muhammad Usama, Muhammad Usman Hadi
wiley   +1 more source

The Utilization of Mobile Technology for Crime Scene Investigation in the San Francisco Bay Area [PDF]

open access: yes, 2016
The research presented aims to explore factors affecting the decision to adopt a mobile crime scene investigation application in police departments throughout the San Francisco Bay Area. To accomplish this goal, the mobile technology acceptance model was
LoGrande, Marc
core   +1 more source

Federated Learning and 5G/6G‐Based Internet of Medical Things (IoMT): Applications, Key Enabling Technologies, Open Issues and Future Research Directions

open access: yesWIREs Data Mining and Knowledge Discovery, Volume 16, Issue 1, March 2026.
This review examines the integration of federated learning (FL) in the Internet of Medical Things (IoMT), enhanced by 5G/6G technologies, to improve healthcare systems with decentralized data processing, enhanced privacy, reduced latency, and efficient resource utilization, while addressing emerging challenges and future research directions.
Abdul Ahad   +6 more
wiley   +1 more source

Edge Computing in Healthcare Using Machine Learning: A Systematic Literature Review

open access: yesWIREs Data Mining and Knowledge Discovery, Volume 16, Issue 1, March 2026.
Three key parts of our review. This review examines recent research on integrating machine learning with edge computing in healthcare. It is structured around three key parts: the demographic characteristics of the selected studies; the themes, tools, motivations, and data sources; and the key limitations, challenges, and future research directions ...
Amir Mashmool   +7 more
wiley   +1 more source

Enhancing Food Safety in the Cold Chain Through Internet of Things and Artificial Intelligence

open access: yesJournal of Food Science, Volume 91, Issue 2, February 2026.
ABSTRACT Effective cold chain management is crucial for ensuring food safety, but traditional monitoring approaches remain reactive and fragmented. Industry 4.0 technologies, such as the Internet of Things (IoT) and artificial intelligence (AI), offer transformative potential for real‐time tracking, automation, and predictive analytics.
Wagner Augusto Müller   +2 more
wiley   +1 more source

Lighter is Better: A Lighter Multi-client Verifiable Outsourced Computation with Hybrid Homomorphic Encryption

open access: yes, 2022
https://doi.org/10.1007/978-3-031-17146 ...
Xingkai Wang   +3 more
openaire   +2 more sources

From Concept to Practice: A Blockchain‐Based Solution for Secure and Efficient Academic Credentials in Higher Education

open access: yesIET Blockchain, Volume 6, Issue 1, January/December 2026.
This paper addresses the critical need for secure diploma generation and verification in higher education by proposing and detailing the practical implementation of DIAR, a blockchain‐based framework. DIAR leverages blockchain's inherent security features and non‐fungible tokens for efficient, cost‐effective and tamper‐proof credential management ...
Avni Rustemi, Fisnik Dalipi
wiley   +1 more source

Encrypt Anything: A Content‐Aware Hierarchical Privacy Protection Method for Image Data

open access: yesIET Computer Vision, Volume 20, Issue 1, January/December 2026.
This paper proposes the Encrypt Anything Model (EAM), a content‐aware hierarchical privacy protection method that integrates the Segment Anything Model (SAM) and Grounding‐DINO to automatically detect and segment privacy entities in images. EAM dynamically adjusts the encryption granularity according to the sensitivity level of privacy and introduces a
Jiawei Han   +5 more
wiley   +1 more source

A Theoretical Model for Privacy-Preserving IoMT Based on Hybrid SDAIPA Classification Approach and Optimized Homomorphic Encryption

open access: yesComputers
The Internet of Medical Things (IoMT) improves healthcare delivery through many medical applications. Because of medical data sensitivity and limited resources of wearable technology, privacy and security are significant challenges.
Mohammed Ali R. Alzahrani
doaj   +1 more source

Artificial Intelligence in Digital Twins: Paradigm, Enabling Technologies and Advantages

open access: yesDigital Twins and Applications, Volume 3, Issue 1, January/December 2026.
As the cornerstone of the digital economy, digital twins have attracted widespread attention in academic circles. Integrations of artificial intelligence (AI) and digital twins (DT), creating an AI–DT system, has become an important research field. In this work, a six‐dimensional paradigm of AI–DT is proposed by integrating artificial intelligence and ...
Cong Peng   +3 more
wiley   +1 more source

Home - About - Disclaimer - Privacy