Search

Your search keyword '"data security"' showing total 196,543 results

Search Constraints

Start Over You searched for: Descriptor "data security" Remove constraint Descriptor: "data security"
196,543 results on '"data security"'

Search Results

1. A Preemptive and Curative Solution to Mitigate Data Breaches: Corporate Social Responsibility as a Double Layer of Protection.

2. Confidential Container Groups.

3. Elevating Security with Arm CCA.

4. mCaptcha: Replacing Captchas with Rate limiters to Improve Security and Accessibility.

5. Improving Privacy and Security of Telehealth.

6. The Pros and Cons of Regulating Artificial Intelligence.

7. Human Intuition and Algorithmic Efficiency Must Be Balanced to Enhance Data Mesh Resilience.

8. HIPAA: A Demand to Modernize Health Legislation

9. Digital Payment Issues.

10. Privacy Risks in the Storytelling of Open Government Data: A Study from the Perspective of User Cognitive Reasoning.

11. Secure archiving system: Integrating object information with document images using mathematical coding techniques.

12. Securing IoT healthcare platform with lightweight encryption.

13. Federated learning in healthcare: A systematic review of evolution from traditional paper records.

14. Boost your VPN Privacy

15. Does AI Technology Adoption Affect Auditors’ Decision-Making Capabilities: Evidence from Jordan?

16. A Whispering Widgets and Wireless Wonders Pioneering Change in the World of IoT

19. How Digital Trust Varies Around the World.

20. Customer Data: Designing for Transparency and Trust.

21. DSpace 7 Benefits: Is It Worth Upgrading?

22. Key-homomorphic and revocable ciphertext-policy attribute based key encapsulation mechanism for multimedia applications.

23. Ensuring the privacy and security of IoT-medical data: a hybrid deep learning-based encryption and blockchain-enabled transmission.

24. Blockchain for Edge Computing in Smart Environments: Use Cases, Issues, and Challenges.

25. PQSF: post-quantum secure privacy-preserving federated learning.

26. Privacy-friendly evaluation of patient data with secure multiparty computation in a European pilot study.

27. Efficient federated learning for pediatric pneumonia on chest X-ray classification.

28. Synergistic Commutative Algorithm for Securing Vector Spatial Data via GD‐PBIBD Fingerprint Encoding and Data Encryption.

29. Bio-Inspired algorithms for secure image steganography: enhancing data security and quality in data transmission.

30. The rule of law system for China's marine security.

31. Who can you trust these days?: Dealing with imposter participants during online recruitment and data collection.

32. Practicing care-full scholarship: Exploring the use of 'visual informed consent' in a study of motherhood, health and agroecology in Coventry, UK.

33. Clinical research vehicles as a modality for medical research education and conduct of decentralized trials, supporting justice, equity, and diversity in research.

34. Differences in Patient Secure Message Volume Among Otolaryngologists: A Retrospective Cohort Study.

35. The Evolving Role of Artificial Intelligence in Radiotherapy Treatment Planning—A Literature Review.

36. Cultural Preservation Through Immersive Technology: The Metaverse as a Pathway to the Past.

37. Understanding employees' responses to information security management practices: a person-environment fit perspective.

38. Separating the Siamese twins: a proposed methodology for differentiating between privacy and security.

39. Validation and application of the human aspects of information security questionnaire for undergraduates: effects of gender, discipline and grade level.

40. Data breaches in healthcare: security mechanisms for attack mitigation.

41. A GSO‐based multi‐objective technique for performance optimization of blockchain‐based industrial Internet of things.

42. An encrypted deduplication scheme based on files diversity.

43. Research on IPFS Image Copyright Protection Method Based on Blockchain.

44. Performance Evaluation of Intelligent Agricultural Supply Chain Based on Structural Equation Model.

45. The Application of Embedded Hardware System and Blockchain in Rural Financial Management Cloud Platform.

46. The comparison of several cryptosystems using the elliptic curve: a report.

47. Optimizing healthcare data quality with optimal features driven mutual entropy gain.

48. A robust algorithm for authenticated health data access via blockchain and cloud computing.

49. Convergent encryption enabled secure data deduplication algorithm for cloud environment.

50. Construction of scientific fitness guidance model based on IoT technology.

Catalog

Books, media, physical & digital resources