[HTML][HTML] Privacy-preserving artificial intelligence in healthcare: Techniques and applications
There has been an increasing interest in translating artificial intelligence (AI) research into
clinically-validated applications to improve the performance, capacity, and efficacy of …
clinically-validated applications to improve the performance, capacity, and efficacy of …
An improved authentication and key management scheme in context of IoT-based wireless sensor network using ECC
Wireless sensor network (WSN) is used for sensing data/information from the nearby
environment with the help of various spatially dispersed miniature sensor devices/nodes …
environment with the help of various spatially dispersed miniature sensor devices/nodes …
[HTML][HTML] TinyWolf—Efficient on-device TinyML training for IoT using enhanced Grey Wolf Optimization
Training a deep learning model generally requires a huge amount of memory and
processing power. Once trained, the learned model can make predictions very fast with very …
processing power. Once trained, the learned model can make predictions very fast with very …
A Comprehensive analysis of Cryptographic Algorithms: Evaluating Security, Efficiency, and Future Challenges
D Ramakrishna, MA Shaik - IEEE Access, 2024 - ieeexplore.ieee.org
Cryptographic techniques are reviewed in this literature review, with particular attention paid
to their applicability, importance, contributions, and field strengths. These algorithms include …
to their applicability, importance, contributions, and field strengths. These algorithms include …
A New Guess‐and‐Determine Method for Cryptanalysis of the GSM Encryption
Cryptanalysis is the process of finding flaws or oversights in an encryption algorithm. Nearly,
all encryption algorithms are carefully examined through cryptanalysis to determine the …
all encryption algorithms are carefully examined through cryptanalysis to determine the …
Price Prediction of Digital Currencies using Machine Learning
Cryptocurrencies have gained immense significance and popularity in recent times. With
thousands of digital currencies available, selecting the right one can be challenging for …
thousands of digital currencies available, selecting the right one can be challenging for …
Multimedia Security Using Blockchain and IoT-Based Distributed System
S Dhar, A Khare - 2023 6th International Conference on …, 2023 - ieeexplore.ieee.org
This article explores how IoT device systems handle multimedia data and presents a secure
multimedia framework utilizing blockchain technology. The proposed framework high-lights …
multimedia framework utilizing blockchain technology. The proposed framework high-lights …
Guest Editorial: Advanced information hiding techniques for industrial applications
Due to the remarkable development of the Internet, users are now allowed easy storage,
duplication, and distribution of digital data/contents for many applications. This has become …
duplication, and distribution of digital data/contents for many applications. This has become …
[PDF][PDF] Image Encryption Based on Hybrid Parallel Algorithm: DES-Present Using 2D-Chaotic System.
Image encryption algorithms have recently been developed to protect data from hackers and
give recipients privacy. DES is a widely recognized block cypher that has certain …
give recipients privacy. DES is a widely recognized block cypher that has certain …
Next-Gen Cryptography: The Role of Machine Learning Applications in Privacy Preservation for Sensitive Data
G Padmapriya, V Vennila, K Anitha… - Machine Learning and …, 2024 - igi-global.com
In a time marked by an ever-increasing number of sensitive data and mounting worries
about breaches of privacy, the area of cryptography has emerged as the frontrunner in the …
about breaches of privacy, the area of cryptography has emerged as the frontrunner in the …