[HTML][HTML] A systematic literature review of attribute based encryption in health services
The widespread adoption of cloud technology in the healthcare industry has achieved
effective outcomes in sharing health records and sensitive data. In recent years, many …
effective outcomes in sharing health records and sensitive data. In recent years, many …
[PDF][PDF] Logistic Regression with Elliptical Curve Cryptography to Establish Secure IoT.
Nowadays, Wireless Sensor Network (WSN) is a modern technology with a wide range of
applications and greatly attractive benefits, for example, self-governing, low expenditure on …
applications and greatly attractive benefits, for example, self-governing, low expenditure on …
A systematic review on elliptic curve cryptography algorithm for internet of things: Categorization, application areas, and security
Cyberattacks on the Internet of Things (IoT) may be avoided by implementing cybersecurity
protocols on IoT devices, platform packages, and Internet tools. A significant problem is …
protocols on IoT devices, platform packages, and Internet tools. A significant problem is …
An effective and enhanced RSA based public key encryption scheme (XRSA)
Cryptography is the mechanism of providing significant security services such as
confidentiality, authentication, and integrity. These services are essentially more important in …
confidentiality, authentication, and integrity. These services are essentially more important in …
AI-HybridChain: Picturized Authentication and DRL based Access Control Method with Secure Two Fold Revocation for Ensuring Cloud Computing Security
SC Krishnan - Future Generation Computer Systems, 2024 - Elsevier
The Internet of Things is susceptible to seepage of private information during the data
sharing. To circumvent this problem, access control and secure data sharing have been …
sharing. To circumvent this problem, access control and secure data sharing have been …
A systematic literature review on software security testing using metaheuristics
F Ahsan, F Anwer - Automated Software Engineering, 2024 - Springer
The security of an application is critical for its success, as breaches cause loss for
organizations and individuals. Search-based software security testing (SBSST) is the field …
organizations and individuals. Search-based software security testing (SBSST) is the field …
Blockchain‐Enabled Decentralized Healthcare Data Exchange: Leveraging Novel Encryption Scheme, Smart Contracts, and Ring Signatures for Enhanced Data …
S Vidhya, PM Siva Raja… - International Journal of …, 2024 - Wiley Online Library
The healthcare industry has undergone a digital transformation in recent years, with the
adoption of electronic health records (EHRs) becoming increasingly prevalent. While this …
adoption of electronic health records (EHRs) becoming increasingly prevalent. While this …
A Study of Elliptic Curve Cryptography and Its Applications
U Vijay Nikhil, Z Stamenkovic… - International Journal of …, 2024 - World Scientific
This paper aims to provide a comprehensive review on Elliptic Curve Cryptography (ECC), a
public key cryptographic system and its applications. The paper discusses important …
public key cryptographic system and its applications. The paper discusses important …
Practically adaptable CPABE based Health-Records sharing framework
With recent elevated adaptation of cloud services in almost every major public sector, the
health sector emerges as a vulnerable segment, particularly in data exchange of sensitive …
health sector emerges as a vulnerable segment, particularly in data exchange of sensitive …
Hybrid Cryptography Techniques for Data Security in Cloud Computing
KK Reddy, AR Chadha, PS Nikhil… - … on Computing, Power …, 2024 - ieeexplore.ieee.org
The Prime objective of cloud computing is that to the centralize processing and storage
capabilities. Since cloud computing elevates performance requirements to greater heights, it …
capabilities. Since cloud computing elevates performance requirements to greater heights, it …