[HTML][HTML] Towards insighting cybersecurity for healthcare domains: A comprehensive review of recent practices and trends

M Javaid, A Haleem, RP Singh, R Suman - Cyber Security and Applications, 2023 - Elsevier
Healthcare information security is becoming a significant responsibility for all healthcare
organisations and individuals. Innovative medical equipment and healthcare apps are vital …

Comprehensive survey: Biometric user authentication application, evaluation, and discussion

R Alrawili, AAS AlQahtani, MK Khan - Computers and Electrical …, 2024 - Elsevier
In this paper, we present a comprehensive review of the literature on biometric user
authentication, encompassing an analysis of key aspects such as the selection of biometric …

Medical image encryption by content-aware DNA computing for secure healthcare

Y Wu, L Zhang, S Berretti, S Wan - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
There exists a rising concern on security of healthcare data and service. Even small lost,
stolen, displaced, hacked, or communicated in personal health data could bring huge …

Trustworthy AI guidelines in biomedical decision-making applications: a scoping review

M Mora-Cantallops, E García-Barriocanal… - Big Data and Cognitive …, 2024 - mdpi.com
Recently proposed legal frameworks for Artificial Intelligence (AI) depart from some
frameworks of concepts regarding ethical and trustworthy AI that provide the technical …

Secure and privacy-preserving authentication scheme using decentralized identifier in metaverse environment

M Kim, J Oh, S Son, Y Park, J Kim, Y Park - Electronics, 2023 - mdpi.com
The metaverse provides a virtual world with many social activities that parallel the real world.
As the metaverse attracts more attention, the importance of security and privacy preservation …

Ensuring security and privacy in Healthcare Systems: a Review Exploring challenges, solutions, Future trends, and the practical applications of Artificial Intelligence

I Bala, I Pindoo, MM Mijwil, M Abotaleb… - Jordan Medical …, 2024 - jjournals.ju.edu.jo
Abstract Background and Aims: The healthcare system's complex structure presents unique
challenges in ensuring security and privacy. This review aimed to explore these challenges …

A recent assessment for the ransomware attacks against the internet of medical things (iomt): A review

T Nusairat, MM Saudi, AB Ahmad - 2023 IEEE 13th …, 2023 - ieeexplore.ieee.org
The magnitude, complexity, and diversity of cyber threats against the Internet of Medical
Things have increased over the past several years, making it challenging to implement …

Cybersecurity comparison of brain-based automotive electrical and electronic architectures

NS Tany, S Suresh, DN Sinha, C Shinde… - Information, 2022 - mdpi.com
Modern autonomous vehicles with an electric/electronic (E/E) architecture represent the next
big step in the automation and evolution of smart and self-driving vehicles. This technology …

Physical-Unclonable-Function-Based Lightweight Three-Factor Authentication for Multiserver Architectures

Q Xie, Y Zhao - Mathematics, 2023 - mdpi.com
To support more complex and robust online services, enterprise-class applications prefer to
interconnect multiple servers as the pedestal to enhance the system's interoperability …

Quantum-Safe Lattice-Based Certificateless Anonymous Authenticated Key Agreement for Internet of Things

G Wei, K Fan, K Zhang, H Wang, H Li… - IEEE Internet of Things …, 2023 - ieeexplore.ieee.org
In recent years, the Internet of Things (IoT) has gained immense popularity in various
aspects of work, learning, and daily life. Within the IoT realm, there is a growing concern …