Medical image encryption: a comprehensive review
In medical information systems, image data can be considered crucial information. As
imaging technology and methods for analyzing medical images advance, there will be a …
imaging technology and methods for analyzing medical images advance, there will be a …
RETRACTED ARTICLE: An adaptive traffic routing approach toward load balancing and congestion control in Cloud–MANET ad hoc networks
S Dalal, B Seth, V Jaglan, M Malik, Surbhi, N Dahiya… - Soft Computing, 2022 - Springer
It would not be an overstatement to say that Cloud services have exponentially increased
the computing power of mobile devices, enabling operators to undertake complex …
the computing power of mobile devices, enabling operators to undertake complex …
Congestion centric multi‐objective reptile search algorithm‐based clustering and routing in cognitive radio sensor network
Abstract In recent trends, Cognitive Radio Sensor Networks (CRSNs) are investigated in‐
depth and getting momentum in all types of applications. CRSN can make use of the …
depth and getting momentum in all types of applications. CRSN can make use of the …
A secure IoT applications allocation framework for integrated fog-cloud environment
Applications of the Internet of Things (IoT) are used in several areas to create a smart
environment such as healthcare, smart agriculture, smart cities, transportation, and water …
environment such as healthcare, smart agriculture, smart cities, transportation, and water …
[PDF][PDF] Secure Cloud Data Storage System Using Hybrid Paillier–Blowfish Algorithm.
Cloud computing utilizes enormous clusters of serviceable and manageable resources that
can be virtually and dynamically reconfigured in order to deliver optimum resource utilization …
can be virtually and dynamically reconfigured in order to deliver optimum resource utilization …
Predicting fraud in financial payment services through optimized hyper-parameter-tuned XGBoost model
S Dalal, B Seth, M Radulescu, C Secara, C Tolea - Mathematics, 2022 - mdpi.com
Online transactions, medical services, financial transactions, and banking all have their
share of fraudulent activity. The annual revenue generated by fraud exceeds $1 trillion. Even …
share of fraudulent activity. The annual revenue generated by fraud exceeds $1 trillion. Even …
AI for identity and access management (IAM) in the cloud: Exploring the potential of artificial intelligence to improve user authentication, authorization, and access …
This comprehensive study explores the integration and effectiveness of Artificial Intelligence
(AI) in Identity and Access Management (IAM) within cloud environments. It primarily focuses …
(AI) in Identity and Access Management (IAM) within cloud environments. It primarily focuses …
Homomorphic cryptosystem-based secure data processing model for edge-assisted IoT healthcare systems
The substantial acceptance of Internet-of-Things (IoT) in digital healthcare systems
necessitates secure data processing before storing it on a cloud server. Since resource …
necessitates secure data processing before storing it on a cloud server. Since resource …
Big data security and privacy in healthcare: A systematic review and future research directions
M Al Zaabi, SM Alhashmi - Information Development, 2024 - journals.sagepub.com
Big data security involves protecting healthcare data from unauthorised use and access and
making any changes, while privacy entails ensuring the confidentiality of individual patient …
making any changes, while privacy entails ensuring the confidentiality of individual patient …
A novel image cryptosystem using gray code, quantum walks, and henon map for cloud applications
Cloud computing plays a vital task in our daily lives, in which an enormous amount of data is
stored daily on cloud storage. The highest priority for cloud data storage is guaranteeing the …
stored daily on cloud storage. The highest priority for cloud data storage is guaranteeing the …