Search

Your search keyword '"data security"' showing total 18,369 results

Search Constraints

Start Over You searched for: Descriptor "data security" Remove constraint Descriptor: "data security" Search Limiters Peer Reviewed Remove constraint Search Limiters: Peer Reviewed
18,369 results on '"data security"'

Search Results

1. A Preemptive and Curative Solution to Mitigate Data Breaches: Corporate Social Responsibility as a Double Layer of Protection.

2. DSpace 7 Benefits: Is It Worth Upgrading?

3. Key-homomorphic and revocable ciphertext-policy attribute based key encapsulation mechanism for multimedia applications.

4. Ensuring the privacy and security of IoT-medical data: a hybrid deep learning-based encryption and blockchain-enabled transmission.

5. Blockchain for Edge Computing in Smart Environments: Use Cases, Issues, and Challenges.

6. PQSF: post-quantum secure privacy-preserving federated learning.

7. Privacy-friendly evaluation of patient data with secure multiparty computation in a European pilot study.

8. Efficient federated learning for pediatric pneumonia on chest X-ray classification.

9. Synergistic Commutative Algorithm for Securing Vector Spatial Data via GD‐PBIBD Fingerprint Encoding and Data Encryption.

10. Bio-Inspired algorithms for secure image steganography: enhancing data security and quality in data transmission.

11. The rule of law system for China's marine security.

12. Who can you trust these days?: Dealing with imposter participants during online recruitment and data collection.

13. Practicing care-full scholarship: Exploring the use of 'visual informed consent' in a study of motherhood, health and agroecology in Coventry, UK.

14. Clinical research vehicles as a modality for medical research education and conduct of decentralized trials, supporting justice, equity, and diversity in research.

15. Differences in Patient Secure Message Volume Among Otolaryngologists: A Retrospective Cohort Study.

16. The Evolving Role of Artificial Intelligence in Radiotherapy Treatment Planning—A Literature Review.

17. Cultural Preservation Through Immersive Technology: The Metaverse as a Pathway to the Past.

18. Understanding employees' responses to information security management practices: a person-environment fit perspective.

19. Separating the Siamese twins: a proposed methodology for differentiating between privacy and security.

20. Validation and application of the human aspects of information security questionnaire for undergraduates: effects of gender, discipline and grade level.

21. Data breaches in healthcare: security mechanisms for attack mitigation.

22. A GSO‐based multi‐objective technique for performance optimization of blockchain‐based industrial Internet of things.

23. An encrypted deduplication scheme based on files diversity.

24. Research on IPFS Image Copyright Protection Method Based on Blockchain.

25. Performance Evaluation of Intelligent Agricultural Supply Chain Based on Structural Equation Model.

26. The Application of Embedded Hardware System and Blockchain in Rural Financial Management Cloud Platform.

27. The comparison of several cryptosystems using the elliptic curve: a report.

28. Optimizing healthcare data quality with optimal features driven mutual entropy gain.

29. A robust algorithm for authenticated health data access via blockchain and cloud computing.

30. Convergent encryption enabled secure data deduplication algorithm for cloud environment.

31. Construction of scientific fitness guidance model based on IoT technology.

32. Evaluating applied security controls for safeguarding medical device‐integrated electronic medical records.

33. An Attribute-Based End-to-End Policy-Controlled Signcryption Scheme for Secure Group Chat Communication.

34. Software as a Medical Device (SaMD) in Digestive Healthcare: Regulatory Challenges and Ethical Implications.

35. Polymer Free Volume‐Controlled Molecular Clock and Emitter for Multicolored Transient Data Display in Advanced Photonic Cryptography.

36. Advanced Authentication and Energy-Efficient Routing Protocol for Wireless Body Area Networks.

37. Regional Load Forecasting Scheme for Security Outsourcing Computation.

38. HE-AO: An Optimization-Based Encryption Approach for Data Delivery Model in A Multi-Tenant Environment.

39. Adherence to non-pharmaceutical interventions following COVID-19 vaccination: a federated cohort study.

40. Secure and efficient public auditing system of user data using hybrid AES-ECC crypto system with Merkle hash tree in blockchain.

41. Linking survey and Facebook data: mechanisms of consent and linkage.

42. MyThisYourThat for interpretable identification of systematic bias in federated learning for biomedical images.

43. Variant graph craft (VGC): a comprehensive tool for analyzing genetic variation and identifying disease-causing variants.

44. ИЗСЛЕДВАНЕ ПРИЛОЖИМОСТТА НА БЛОКОВИ ВЕРИГИ ОТ ПЪРВО НИВО (L1) В СИСТЕМА ЗА ЕЛЕКТРОННО ОБУЧЕНИЕ.

45. ChatGPT’s Role in Improving Education Among Patients Seeking Emergency Medical Treatment.

46. Evaluating the Security of Merkle Trees: An Analysis of Data Falsification Probabilities.

47. Lattice-Based Post-Quantum Public Key Encryption Scheme Using ElGamal's Principles.

48. Ethical predicaments and countermeasures in nursing informatics.

49. Cyberethics in nursing education: Ethical implications of artificial intelligence.

50. Tech's Dark Side: US Hospitals Face Emerging Threats.

Catalog

Books, media, physical & digital resources