Results 211 to 220 of about 359,604 (243)
Some of the next articles are maybe not open access.

Forward Secure Equality Test for Secure Data Sharing in Healthcare Systems

IEEE Internet of Things Journal
In healthcare systems, the protection of the sensitive data of patient during sharing across multiple entities is crucial. Encrypting these data before outsourcing to the healthcare server is an effective method to protect data privacy.
Zhonghao Li   +4 more
semanticscholar   +1 more source

A Survey on Hybrid Secure Key Management System (HSKMS) for Multi-Tenant Cloud Environments

International Journal of Engineering Technology and Management Sciences
In a multi-tenant cloud environment, cleanliness could be ensured by securely accessing and effectively keying information using different available ways and techniques.
Sree Lakshmi Done   +1 more
semanticscholar   +1 more source

Confidential Computing in Front-End: Enhancing Data Security with Secure Enclaves and Homomorphic Encryption

International Journal of Advanced Multidisciplinary Research and Studies
This thesis investigates how homomorphic encryption and, more especially, Secure Enclaves might improve data security in front-end web systems using Confidential Computing methods.
Yuliia Horbenko
semanticscholar   +1 more source

An Efficient and Secure Data Sharing Scheme for Edge-Enabled IoT

International Journal of Advances in Engineering and Management
The project proposes an Edge-based Blockchain Secure Data Sharing Scheme (EBSDSS) to enhance the efficiency and security of data transmission between IoT devices, edge servers, and cloud servers, addressing latency and security concerns inherent in ...
Sudheekar Reddy Pothireddy
semanticscholar   +1 more source

Efficient blockchain based solution for secure medical record management

International Journal of Informatics and Communication Technology (IJ-ICT)
Electronic medical records (EMRs) have become a key player in the healthcare ecosystem contributing to the assessment of ailments, the choice of the treatment avenue, and the delivery of services.
D. Mishra   +4 more
semanticscholar   +1 more source

Secure Data Management in Cloud Environments

International journal of research and innovation in applied science
This article explores the challenges of secure data management in cloud environments and presents an innovative access control framework designed to address these issues. In the era of cloud computing, while the benefits of scalable storage and on-demand
Chris Gilbert   +2 more
semanticscholar   +1 more source

A Blockchain-based Multi-Metric Trust Management Framework for Secure and Scalable Vehicular Ad-Hoc Networks

2025 Third International Conference on Augmented Intelligence and Sustainable Systems (ICAISS)
With Vehicular Ad-Hoc Networks (VANETs) now integrated into intelligent transportation systems, obtaining critical security and trust in such environments where vehicles often exchange sensitive information is becoming a challenge.
R. Boopathi   +5 more
semanticscholar   +1 more source

Secure Cloud Storage and Authentication for Health Insurance Data

International Journal of Advances in Engineering and Management
Data privacy and security have emerged as crucial issues in the healthcare insurance environment, owing to increasing reliance on digital data. Protecting sensitive customer data would be a fundamental requirement for compliance and risk management ...
Bhavya Kadiyala   +5 more
semanticscholar   +1 more source

The Importance of Network Security in Protecting Sensitive Data and Information

International journal of research and innovation in applied science
Network security has remained a major concern especially in the modern world where technological advancement is rapidly evolving. This study explores the concept of data and information security especially in today’s environment where cyber risks like ...
Nwakeze Osita Miracle.
semanticscholar   +1 more source

Research on Secure Sharing of Electronic Accounting Voucher Data Based on Asymmetric Encryption Algorithm

Proceedings of the 2nd International Conference on Intelligent Computing and Data Analysis
In secure sharing of electronic accounting voucher data, using only original data leads to poor security. So, a secure sharing method based on asymmetric encryption algorithm is proposed.
Junting Deng
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy