Advancing Healthcare Security: A Cutting-Edge Zero-Trust Blockchain Solution for Protecting Electronic Health Records

R Benaich, S El Mendili, Y Gahi - HighTech and Innovation …, 2023 - hightechjournal.org
The effective management of electronic health records (EHRs) is vital in healthcare.
However, traditional systems often need help handling data inconsistently, providing limited …

SDTA: Secure Decentralized Trading Alliance for Electronic Medical Data

X Zhang, Y Su, J Qin, J Sun - The Computer Journal, 2024 - academic.oup.com
Massive medical data are indispensable for training diagnostic models to provide high-
quality health monitoring services. The methods for sharing data in existing works involve …

IPFS-blockchain-based delegation model for internet of medical robotics things telesurgery system

S Basudan - Connection Science, 2024 - Taylor & Francis
The concept of the Internet of Medical Robotics Things (IoMRT) is where intelligent robots
assess surrounding events, combine information from their sensors, use both local and …

[HTML][HTML] A cross-chain access control mechanism based on blockchain and the threshold Paillier cryptosystem

H Si, W Li, N Su, T Li, Y Li, C Zhang, B Fernando… - Computer …, 2024 - Elsevier
With the continuous maturation of blockchain technology and the increasing demands for
various industry applications, data sharing and interoperability among different blockchain …

Quantum particle Swarm optimized extreme learning machine for intrusion detection

H Qi, X Liu, A Gani, C Gong - The Journal of Supercomputing, 2024 - Springer
Ensuring a secure online environment hinges on the timely detection of network attacks.
Nevertheless, existing detection methods often grapple with the delicate balance between …

Bypassing software-based remote attestation using debug registers

Z Zhang, J Xue, T Mu, T Yu, K Qiu, T Chen… - Connection Science, 2024 - Taylor & Francis
Remote attestation (RA) is an essential feature in many security protocols to verify the
memory integrity of remote embedded devices susceptible to malware infections. The …