Secure mobile agents for efficient medical information retrieval: A verifiable variable threshold secret sharing approach. [PDF]
Kumar P +5 more
europepmc +1 more source
An Efficient and Secure Semi-Quantum Secret Sharing Scheme Based on <i>W</i> State Sharing of Specific Bits. [PDF]
Xing K, Lu R, Liu S, Lan L.
europepmc +1 more source
A secured cloud‐medical data sharing with A‐BRSA and Salp ‐Ant Lion Optimisation Algorithm
Abstract Sharing medical data among healthcare providers, researchers, and patients is crucial for efficient healthcare services. Cloud‐assisted smart healthcare (s‐healthcare) systems have made it easier to store EHRs effectively. However, the traditional encryption algorithms used to secure this data can be vulnerable to attacks if the encryption key
Adel Binbusayyis +7 more
wiley +1 more source
Blockchain-Enabled Identity Based Authentication Scheme for Cellular Connected Drones. [PDF]
Su Y +5 more
europepmc +1 more source
Abstract Data is the key element that runs the modern society. Large amounts of data are being released day by day as a result of many activities. The digital data is transferred through the Internet which may be vulnerable to attacks while transmitting. Especially, the medical data is observed to be of at most importance.
Rupa Ch +4 more
wiley +1 more source
A secure data sharing scheme based on broadcast signcryption in data center. [PDF]
Dong R, Li Y, Zhu L.
europepmc +1 more source
ABSTRACT Data from five rocket‐triggered lightning flashes are adopted to analyse the correlated transient response of buried cables and lightning channel radiations. These five flashes have the same termination point that is right above the buried cables and involve a total of 32 return strokes.
Mi Zhou +9 more
wiley +1 more source
Post-Quantum Revocable Linkable Ring Signature Scheme Based on SPHINCS+ for V2G Scenarios. [PDF]
Liu S, Du YN, Wang XA, Hu X, Su HE.
europepmc +1 more source
Secure electronic health record access control via blockchain, dual-attribute encryption, and large language model-based attribute extraction. [PDF]
Nekouie A +3 more
europepmc +1 more source
Reversible image steganography based on residual structure and attention mechanism. [PDF]
Liu L, Tong S, Xue Q.
europepmc +1 more source

