Results 271 to 280 of about 112,587 (333)
BAAR: A framework for blockchain-based anonymous and revocable user authentication scheme. [PDF]
Ahmed M, Ahmad A, Zeshan F, Akram S.
europepmc +1 more source
A Two-Phase Embedding Approach for Secure Distributed Steganography. [PDF]
Woźniak K, Ogiela MR, Ogiela L.
europepmc +1 more source
A secured cloud‐medical data sharing with A‐BRSA and Salp ‐Ant Lion Optimisation Algorithm
Abstract Sharing medical data among healthcare providers, researchers, and patients is crucial for efficient healthcare services. Cloud‐assisted smart healthcare (s‐healthcare) systems have made it easier to store EHRs effectively. However, the traditional encryption algorithms used to secure this data can be vulnerable to attacks if the encryption key
Adel Binbusayyis +7 more
wiley +1 more source
Lightweight semantic compression visual cryptography for secure medical image transmission in IoT systems. [PDF]
Blesswin AJ +5 more
europepmc +1 more source
Abstract Data is the key element that runs the modern society. Large amounts of data are being released day by day as a result of many activities. The digital data is transferred through the Internet which may be vulnerable to attacks while transmitting. Especially, the medical data is observed to be of at most importance.
Rupa Ch +4 more
wiley +1 more source
Resilient and verifiable outsourced attribute-based non-interactive oblivious transfer protocol for tactical edge networks. [PDF]
Liu W, Fu B, Wang L.
europepmc +1 more source
DrLS: Distortion‐Resistant Lossless Steganography via Colour Depth Interpolation
ABSTRACT The lossless data steganography is to hide a certain amount of information into a container image. Previous lossless steganography methods fail to strike a balance between capacity, imperceptibility, accuracy, and robustness, commonly vulnerable to distortion on container images.
Youmin Xu +3 more
wiley +1 more source
A compact public key encryption with equality test for lattice in cloud computing. [PDF]
He J, Ye Q, Yang Z, Wang S, Wang J.
europepmc +1 more source
ABSTRACT Data from five rocket‐triggered lightning flashes are adopted to analyse the correlated transient response of buried cables and lightning channel radiations. These five flashes have the same termination point that is right above the buried cables and involve a total of 32 return strokes.
Mi Zhou +9 more
wiley +1 more source

