[HTML][HTML] The computing continuum: From IoT to the cloud

A Al-Dulaimy, M Jansen, B Johansson, A Trivedi… - Internet of Things, 2024 - Elsevier
In the era of the IoT revolution, applications are becoming ever more sophisticated and
accompanied by diverse functional and non-functional requirements, including those related …

A blockchain based secure and privacy aware medical data sharing using smart contract and encryption scheme

S Vidhya, V Kalaivani - Peer-to-Peer Networking and Applications, 2023 - Springer
With the rapid progress of network information technologies, security in medical data
transmission has emerged as a popular research topic. Electronic Health Data (EHR) is …

Detection and prevention of UDP reflection amplification attack in WSN using cumulative sum algorithm

BJS Kumar, VSS Gowda - 2022 IEEE International Conference …, 2022 - ieeexplore.ieee.org
Wireless sensor networks are used in many areas such as war field surveillance, monitoring
of patient, controlling traffic, environmental and building surveillance. Wireless technology …

Detection and Prevention of UDP Protocol Exploiting and Smurf Attack in WSN Using Sequential Probability Ratio Test Algorithm

NK Singh, SK BJ - … Conference on Data Science and Network …, 2023 - ieeexplore.ieee.org
Wireless sensor networks (WSNs) have gained popularity in diverse areas such as military
surveillance, patient monitoring, traffic control, environmental and structural monitoring …

Human Health Care Systems Analysis for Cloud Data Structure of Biometric System Using ECG Analysis

A Sonya, G Kavitha, S Muthusundari - Evolutionary Computing and Mobile …, 2022 - Springer
A cloud security system using cryptography has gained more importance among
researchers in recent times. One of the key elements of a cryptography system is that it is …

[PDF][PDF] MULTI-SHAPE SYMMETRIC ENCRYPTION MECHANISM FOR NON-GENERIC ATTACKS MITIGATION

AAA Abdelgader - 2022 - core.ac.uk
Static cyphers use static transformations for encryption and decryption. Therefore, the
attacker will have some knowledge that can be exploited to construct assaults since the …

[引用][C] The security and privacy of electronic health records in healthcare systems: A systematic review

IS Abdulhameed - Turkish Journal of Computer and Mathematics …, 2021