[PDF][PDF] Architecture, Protocols, and Applications of the Internet of Medical Things (IoMT).

NA Askar, A Habbal, AH Mohammed, MS Sajat… - J. Commun., 2022 - researchgate.net
1 Department of Computer Engineering, Faculty of Engineering, Karabuk University,
Karabuk, Turkey 2School of Computing, Universiti Utara Malaysia, Kedah, Malaysia 3 …

[HTML][HTML] Privacy as a Lifestyle: Empowering assistive technologies for people with disabilities, challenges and future directions

A Habbal, H Hamouda, AM Alnajim, S Khan… - Journal of King Saud …, 2024 - Elsevier
Between the changing Industry 4.0 landscape and the rise of Industry 5.0, where human
intelligence and intelligent machines work together, vast amounts of privacy-sensitive data …

Performance evaluation of secret sharing schemes with data recovery in secured and reliable heterogeneous multi-cloud storage

A Tchernykh, V Miranda-López, M Babenko… - Cluster …, 2019 - Springer
Abstract Properties of redundant residue number system (RRNS) are used for detecting and
correcting errors during the data storing, processing and transmission. However, detection …

A secure hash function based on feedback iterative structure

Y Yang, F Chen, J Chen, Y Zhang… - Enterprise Information …, 2019 - Taylor & Francis
Rapid growth of internet data has created enormous security challenges on authenticity,
availability and integrity protection of these outsourced data. Hash function is one of the …

[PDF][PDF] Secure data outsourcing on cloud using secret sharing scheme.

AK Chattopadhyay, A Nag, K Majumder - Int. J. Netw. Secur., 2017 - academia.edu
Abstract Data Outsourcing in Cloud (DOC) has its exclusive benefits like low-cost, lower
management overhead, elasticity of storage etc and these encourage organizations to use …

On modular (CRT-based) secret sharing

NN Shenets - Journal of Computer Virology and Hacking Techniques, 2024 - Springer
Secret sharing scheme (SSS) allows to share some secret s among n parties in such a way
that only certain subsets of them can recover the secret. The first SSSs were independently …

A cloud-based architecture for mitigating privacy issues in online social networks

M Kaiiali, A Iliyasu, AS Wazan, A Habbal… - … Arab Journal of …, 2019 - pure.qub.ac.uk
Online social media networks have revolutionized the way information is shared across our
societies and around the world. Information is now delivered for free to a large audience …

[PDF][PDF] Computationally secure threshold secret sharing scheme with minimal redundancy.

MG Babenko, A Tchernykh, E Golimblevskaia… - ICCS-DE, 2020 - academia.edu
When designing and using distributed storage systems with cloud technology, the security
issues become crucial. One of the promising mechanisms is the computationally secure …

Comparison of secret splitting, secret sharing and recursive threshold visual cryptography for security of handwritten images

S Sugianto, S Suharjito… - … Electronics and Control), 2018 - telkomnika.uad.ac.id
The secret sharing is a method to protect confidentiality and integrity of the secret messages
by distributing the message shares into several recipients. The secret message could not be …

SHAMIR SIR PAYLAŞIM ALGORİTMASININ GÖRÜNTÜ STEGANOGRAFİSİNDE UYGULANMASI

K Zekeriya, S SOLAK - Journal on Mathematic, Engineering and Natural …, 2022 - ejons.org
Özet İnternet kullanımının artmasıyla doğru orantılı olarak bilgi akışında artış yaşanmıştır. Bu
durum sonucunda bilginin, siber saldırılara ve güvenlik zafiyetlerine karşı korunma ihtiyacı …