Search

Your search keyword '"security and privacy"' showing total 509 results

Search Constraints

Start Over You searched for: Descriptor "security and privacy" Remove constraint Descriptor: "security and privacy" Publication Year Range Last 3 years Remove constraint Publication Year Range: Last 3 years
509 results on '"security and privacy"'

Search Results

1. Securing blockchain-enabled smart health care image encryption framework using Tinkerbell Map.

2. Cognitive Tracing Data Trails: Auditing Data Provenance in Discriminative Language Models Using Accumulated Discrepancy Score.

3. BeLAS: Blockchain-envisioned lightweight authentication scheme for securing eHealth records.

4. A smart surveillance system utilizing modified federated machine learning: Gossip‐verifiable and quantum‐safe approach.

6. IMPROVING DATA SECURITY AND SCALABILITY IN HEALTHCARE SYSTEM USING BLOCKCHAIN TECHNOLOGY.

7. Securing blockchain-enabled smart health care image encryption framework using Tinkerbell Map

8. Restoring private autism dataset from sanitized database using an optimized key produced from enhanced combined PSO-GWO framework

9. Toward a Secure and Private Cross-Chain Protocol Based on Encrypted Communication.

10. A systematic review and research challenges on phishing cyberattacks from an electroencephalography and gaze-based perspective.

11. Circulation of legitimate information over VANETs using threshold signature scheme.

12. Enhancing privacy-preserving in vehicular cloud through an incentive-based strategy.

13. Review of Security and Privacy-Based IoT Smart Home Access Control Devices.

14. Building trust in remote attestation through transparency – a qualitative user study on observable attestation.

15. A survey on lattice‐based security and authentication schemes for smart‐grid networks in the post‐quantum era.

16. Blockchain-as-a-Service for the Security Challenges and Solutions in the Internet of Things Environment.

17. Spacelord: Private and Secure Smart Space Sharing.

18. Federated Learning for Maritime Environments: Use Cases, Experimental Results, and Open Issues.

19. Decentralized Edge-Based Detection of Label Flipping Attacks in Federated Learning

20. Comprehensive Challenges to E-government in Iraq

21. IoT and Supply Chain Interoperability: Bridging the Connectivity Gap

22. A Secure Searchable Encryption Scheme Over the Cloud

23. Exploring Opportunities and Challenges in Sustainable and Smart Cities Through the Lens of Smart Technologies

24. Edge Computing Security: Overview and Challenges

25. A Heterogeneous Computing Framework for Accelerating Fully Homomorphic Encryption

26. Wireless Modulation Identification: Filling the Gap in IoT Networks Security Audit

27. An End-to-End Secure Solution for IoMT Data Exchange

28. Shaping the Next Generation Smart City Ecosystem: An Investigation on the Requirements, Applications, Architecture, Security and Privacy, and Open Research Questions

29. Exploring Users’ Perspectives of Mobile Health Privacy and Autonomy

33. Sentiment Analysis of Crypto Currency Trading Applications in India Using Machine Learning

35. Resource Provider Determination in Cloud Environments

37. An Efficient Decentralized Federated Learning Framework Based on Directed Acyclic Graph

38. Sound Abstract Nonexploitability Analysis

40. Block-Privacy: Privacy Preserving Smart Healthcare Framework: Leveraging Blockchain and Functional Encryption

43. All in How You Ask for It: Simple Black-Box Method for Jailbreak Attacks.

45. Intension to Use Mobile Banking: An Integration of Theory of Planned Behaviour (TPB) and Technology Acceptance Model (TAM).

46. Protecting IoT devices from security attacks using effective decision-making strategy of appropriate features.

47. A sentiment analysis approach for understanding users’ perception of metaverse marketplace

48. MCDH-SLKAP: Modified Computational Diffie-Hellman-Based Secure and Lightweight Key Agreement Protocol for Decentralized Edge Computing Networks

49. Securing Personally Identifiable Information: A Survey of SOTA Techniques, and a Way Forward

50. A Survey on Key Agreement and Authentication Protocol for Internet of Things Application

Catalog

Books, media, physical & digital resources