[HTML][HTML] Insights into Internet of Medical Things (IoMT): Data fusion, security issues and potential solutions

SF Ahmed, MSB Alam, S Afrin, SJ Rafa, N Rafa… - Information …, 2024 - Elsevier
Abstract The Internet of Medical Things (IoMT) has created a wide range of opportunities for
knowledge exchange in numerous industries. The opportunities include patient …

Crypto-Stegno based model for securing medical information on IOMT platform

RO Ogundokun, JB Awotunde, EA Adeniyi… - Multimedia tools and …, 2021 - Springer
The integration of the Internet of Things in medical systems referred to as the Internet of
Medical Things (IoMT), which supports medical events for instance real-time diagnosis …

Enhancing security by using GIFT and ECC encryption method in multi-tenant datacenters

J Wang, Y Liu, S Rao, RS Sherratt… - Computers, Materials & …, 2023 - centaur.reading.ac.uk
Data security and user privacy have become crucial elements in multi-tenant data centers.
Various traffic types in the multi-tenant data center in the cloud environment have their …

A safe and secured medical textual information using an improved LSB image steganography

RO Ogundokun, OC Abikoye - International Journal of Digital …, 2021 - Wiley Online Library
Safe conveyance of medical data across unsecured networks nowadays is an essential
issue in telemedicine. With the exponential growth of multimedia technologies and …

[PDF][PDF] Efficiency of LSB steganography on medical information

OC Abikoye, RO Ogundokun - International Journal of Electrical and …, 2021 - academia.edu
The development of the medical field had led to the transformation of communication from
paper information into the digital form. Medical information security had become a great …

Quantum key distribution scheme with key recycling in integrated optical network

Y Xu, L Chen, H Zhu - International Journal of Theoretical Physics, 2023 - Springer
Abstract Quantum Key Distribution (QKD) effectively solve the problem that optical network is
vulnerable to wireless network attacks by using the principle of quantum mechanics. This …

A Blockchain-based Model for Securing Data Pipeline in a Heterogeneous Information System

MN Ramahlosi, Y Madani, A Akanbi - arXiv preprint arXiv:2401.09240, 2024 - arxiv.org
In our digital world, access to personal and public data has become an item of concern, with
challenging security and privacy aspects. Modern information systems are heterogeneous in …

A randomized encryption algorithm for the MPEG-DASH digital rights management

RG Jimoh, JB Awotunde, RO Ogundokun… - … Security Journal: A …, 2024 - Taylor & Francis
This article addresses the pervasive issue of digital piracy in the movie industry. Despite
substantial efforts to combat piracy, its impact remains significant, resulting in substantial …

Development of a Real Time Smishing Detection Mobile Application using Rule Based Techniques

ON Akande, HB Akande, AA Kayode… - Procedia Computer …, 2022 - Elsevier
The introduction of alternative messaging platforms on mobile devices have not been able to
phase off Short Messaging Service (SMS) as the most widely used means of textual …

[PDF][PDF] Enhancing Security in Digital Data using various Function of S-box in Data Encryption Standard Method.

LE Sunny, V Paul - Webology, 2021 - webology.org
Stage of networking is quintessential task in which security comes into play. Securing these
networks which contains confidential digital data that needs to secured will be the agenda of …