Results 211 to 220 of about 359,604 (243)
Some of the next articles are maybe not open access.
Forward Secure Equality Test for Secure Data Sharing in Healthcare Systems
IEEE Internet of Things JournalIn healthcare systems, the protection of the sensitive data of patient during sharing across multiple entities is crucial. Encrypting these data before outsourcing to the healthcare server is an effective method to protect data privacy.
Zhonghao Li +4 more
semanticscholar +1 more source
A Survey on Hybrid Secure Key Management System (HSKMS) for Multi-Tenant Cloud Environments
International Journal of Engineering Technology and Management SciencesIn a multi-tenant cloud environment, cleanliness could be ensured by securely accessing and effectively keying information using different available ways and techniques.
Sree Lakshmi Done +1 more
semanticscholar +1 more source
International Journal of Advanced Multidisciplinary Research and Studies
This thesis investigates how homomorphic encryption and, more especially, Secure Enclaves might improve data security in front-end web systems using Confidential Computing methods.
Yuliia Horbenko
semanticscholar +1 more source
This thesis investigates how homomorphic encryption and, more especially, Secure Enclaves might improve data security in front-end web systems using Confidential Computing methods.
Yuliia Horbenko
semanticscholar +1 more source
An Efficient and Secure Data Sharing Scheme for Edge-Enabled IoT
International Journal of Advances in Engineering and ManagementThe project proposes an Edge-based Blockchain Secure Data Sharing Scheme (EBSDSS) to enhance the efficiency and security of data transmission between IoT devices, edge servers, and cloud servers, addressing latency and security concerns inherent in ...
Sudheekar Reddy Pothireddy
semanticscholar +1 more source
Efficient blockchain based solution for secure medical record management
International Journal of Informatics and Communication Technology (IJ-ICT)Electronic medical records (EMRs) have become a key player in the healthcare ecosystem contributing to the assessment of ailments, the choice of the treatment avenue, and the delivery of services.
D. Mishra +4 more
semanticscholar +1 more source
Secure Data Management in Cloud Environments
International journal of research and innovation in applied scienceThis article explores the challenges of secure data management in cloud environments and presents an innovative access control framework designed to address these issues. In the era of cloud computing, while the benefits of scalable storage and on-demand
Chris Gilbert +2 more
semanticscholar +1 more source
2025 Third International Conference on Augmented Intelligence and Sustainable Systems (ICAISS)
With Vehicular Ad-Hoc Networks (VANETs) now integrated into intelligent transportation systems, obtaining critical security and trust in such environments where vehicles often exchange sensitive information is becoming a challenge.
R. Boopathi +5 more
semanticscholar +1 more source
With Vehicular Ad-Hoc Networks (VANETs) now integrated into intelligent transportation systems, obtaining critical security and trust in such environments where vehicles often exchange sensitive information is becoming a challenge.
R. Boopathi +5 more
semanticscholar +1 more source
Secure Cloud Storage and Authentication for Health Insurance Data
International Journal of Advances in Engineering and ManagementData privacy and security have emerged as crucial issues in the healthcare insurance environment, owing to increasing reliance on digital data. Protecting sensitive customer data would be a fundamental requirement for compliance and risk management ...
Bhavya Kadiyala +5 more
semanticscholar +1 more source
The Importance of Network Security in Protecting Sensitive Data and Information
International journal of research and innovation in applied scienceNetwork security has remained a major concern especially in the modern world where technological advancement is rapidly evolving. This study explores the concept of data and information security especially in today’s environment where cyber risks like ...
Nwakeze Osita Miracle.
semanticscholar +1 more source
Proceedings of the 2nd International Conference on Intelligent Computing and Data Analysis
In secure sharing of electronic accounting voucher data, using only original data leads to poor security. So, a secure sharing method based on asymmetric encryption algorithm is proposed.
Junting Deng
semanticscholar +1 more source
In secure sharing of electronic accounting voucher data, using only original data leads to poor security. So, a secure sharing method based on asymmetric encryption algorithm is proposed.
Junting Deng
semanticscholar +1 more source

