Results 21 to 30 of about 339,481 (270)

Towards roadmap to implement blockchain in healthcare systems based on a maturity model

open access: yesJournal of Software: Evolution and Process, Volume 34, Issue 12, December 2022., 2022
This study presents a roadmap to develop a maturity model for blockchain in healthcare (MMBH) based on critical barriers (CBs), critical success factors (CSFs), and the best practices for blockchain implementation in healthcare systems. As a first step to develop the MMBH, in this paper, we present the initial results of a systematic literature review (
Muhammad Azeem Akbar   +5 more
wiley   +1 more source

Securing Financial Transactions with a Robust Algorithm: Preventing Double-Spending Attacks

open access: yesComputers, 2023
A zero-confirmation transaction is a transaction that has not yet been confirmed on the blockchain and is not yet part of the blockchain. The network propagates zero-confirmation transactions quickly, but they are not secured against double-spending ...
Hasan Hashim   +5 more
doaj   +1 more source

EESSI: A cross‐platform ready‐to‐use optimised scientific software stack

open access: yesSoftware: Practice and Experience, Volume 53, Issue 1, Page 176-210, January 2023., 2023
Abstract Getting scientific software installed correctly and ensuring it performs well has been a ubiquitous problem for several decades now, which is compounded currently by the changing landscape of computational science with the (re‐)emergence of different microprocessor families, and the expansion to additional scientific domains like artificial ...
Bob Dröge   +5 more
wiley   +1 more source

Secure Group based Routing and Flawless Trust Formulation in MANET using Unsupervised Machine Learning Approach for IoT Applications [PDF]

open access: yesEAI Endorsed Transactions on Energy Web, 2019
INTRODUCTION: Mobile Adhoc Network (MANET) is integrated with Internet of Things (IoT) in many application cases due to its flexibility and scalability. The dynamic nature of MANET introduces some security threats in IoT environment.
Maitreyi Ponguwala, DR.Sreenivasa Rao
doaj   +1 more source

Analysis of the Possibility of Using Selected Hash Functions Submitted for the SHA-3 Competition in the SDEx Encryption Method [PDF]

open access: yesInternational Journal of Electronics and Telecommunications, 2022
The paper presents analysis of the possibility of using selected hash functions submitted for the SHA-3 competition in the SDEx encryption method. The group of these functions will include the finalists of the SHA-3 competition, i.e.
Artur Hłobaż
doaj   +1 more source

Homomorphic Hashing Based on Elliptic Curve Cryptography [PDF]

open access: yes, 2023
For avoiding the exposure of plaintexts in cloud environments, some homomorphic hashing algorithms have been proposed to generate the hash value of each plaintext, and cloud environments only store the hash values and calculate the hash values for future needs.
arxiv   +1 more source

User privacy prevention model using supervised federated learning‐based block chain approach for internet of Medical Things

open access: yesCAAI Transactions on Intelligence Technology, EarlyView., 2023
Abstract This research focuses on addressing the privacy issues in healthcare advancement monitoring with the rapid establishment of the decentralised communication system in the Internet of Medical Things (IoMT). An integrated blockchain homomorphic encryption standard with an in‐build supervised learning‐based smart contract is designed to improvise ...
Chandramohan Dhasarathan   +7 more
wiley   +1 more source

A Perceptual Image Hashing Algorithm for Hybrid Document Security [PDF]

open access: yes2017 14th IAPR International Conference on Document Analysis and Recognition (ICDAR), 2017
In order to create an automatic document security system one needs to secure the textual content but also the graphical content of the document. This paper proposes a hashing algorithm capable of securing the graphical parts of paper and digital documents with unprecedented performance and a very small digest.
Eskenazi, Sébastien   +3 more
openaire   +2 more sources

Hash Algorithm In Verification Of Certificate Data Integrity And Security

open access: yesAptisi Transactions on Technopreneurship (ATT), 2021
The hash function is the most important cryptographic primitive function and is an integral part of the blockchain data structure. Hashes are often used in cryptographic protocols, information security applications such as Digital Signatures and message authentication codes (MACs).
Muhammad Rehan Anwar   +2 more
openaire   +3 more sources

A secure data transmission and efficient data balancing approach for 5G‐based IoT data using UUDIS‐ECC and LSRHS‐CNN algorithms

open access: yesIET Communications, 2022
Due to the realization of 5G technology, the Internet of things (IoT) has made remarkable advancements in recent years. However, security along with data balancing issues is proffered owing to IoT data's growth.
Kusum Yadav   +6 more
doaj   +1 more source

Home - About - Disclaimer - Privacy