A smart contract-driven access control scheme with integrity checking for electronic health records

H Li, D Li, W Liang - Cluster Computing, 2024 - Springer
The application of healthcare systems has led to an explosive growth in personal electronic
health records (EHRs). These EHRs are generated from different healthcare institutions and …

Smart Patient Monitoring and Recommendation (SPMR) Using Cloud Analytics and Deep Learning

A Sundas, S Badotra, GS Shahi, A Verma… - IEEE …, 2024 - ieeexplore.ieee.org
The escalating global prevalence of chronic and lifestyle-related illnesses presents
substantial societal and economic challenges. This work delves into an extensive review of …

Adaptive Spatial Scheduling for Event Traffic in LoRaWAN Networks

V Asteriou, K Kantelis, GA Beletsioti, A Valkanis… - Sensors, 2024 - mdpi.com
Low-Power Wide-Area Networks constitute a leading, emerging Internet-of-Things
technology, with important applications in environmental and industrial monitoring and …

[HTML][HTML] Towards Building a Faster and Incentive Enabled Privacy-Preserving Proof of Location Scheme from GTOTP

C Ma, Y Liu, Z Yang, J Ma - Electronics, 2024 - mdpi.com
In recent years, there has been significant growth in location-based services (LBSs) and
applications. These services empower users to transmit their location data to location …

Secure and efficient data storage with Rivest Shamir Adleman algorithm in cloud environment

E Elumalai, D Muruganandam - Bulletin of Electrical Engineering and …, 2024 - beei.org
Cloud computing rapidly is a prerequisite and releases resources with minimal management
effort. The surfacing of the cloud has significantly distorted the general insight into …

Quantum Shield for IoT: Enhancing Bluetooth Security with a Novel Hybrid Encryption Algorithm

SAR Shirazi, A Wahab, SA Shah, A Anwar… - The Asian Bulletin of …, 2024 - abbdm.com
Bluetooth communication enables effective data sharing for a wide range of applications,
from audio streaming to IoT devices, boosting user ease and productivity. Bluetooth security …

An innovative design of substitution-box using Trigonometric-Multiplicative Functions Using Square Root Arguments: A Data-driven study.

SAR Shirazi, SA Shah, A Wahab… - The Asian Bulletin of Big …, 2024 - abbdm.com
In the evolving landscape of digital technology, the imperative for robust data security
mechanisms has escalated, given the increasing sophistication of cyber threats. This …

The Analysis and Comparison of Various Cryptographic Algorithms to Improve Network Security: Insights from an Institutional laboratory Setup

N Ganesh, E Saraf, S Chaturvedi - 2024 - researchsquare.com
In an era of growing cyber dangers, strong encryption solutions are required to maintain
data confidentiality, integrity, and authenticity. After doing a thorough examination of sixteen …

En utforskning av elektronisk dokumentations säkerhet: Tekniska aspekter av digitala signaturer: Utveckling av en prototyp för elektronisk Dokumentations säkerhet

J Kelati - 2024 - diva-portal.org
Denna rapport presenterar ett utvecklingsarbete av standardiserade tillvägagångssätt för att
bygga ett ramverk för dokumentsignering. Studien fokuserar på tre olika delar av …

[PDF][PDF] A Harmonic Approach to Handwriting Style Synthesis Using Deep Learning

MA Tusher, SC Kongara, SD Pande, SK Kim… - researchgate.net
The challenging task of handwriting style synthesis requires capturing the individuality and
diversity of human handwriting. The majority of currently available methods use either a …