Zobrazeno 1 - 10
of 147
pro vyhledávání: '"Andrei V. Kelarev"'
Publikováno v:
AIMS Medical Science, Vol 5, Iss 1, Pp 1-22 (2017)
This review article presents a survey of recent work devoted to advanced state-of-the-art methods for securing of medical databases. We concentrate on three main directions, which have received attention recently: attribute-based encryption for enabl
Externí odkaz:
https://doaj.org/article/c260c3226637488aa437f2a27cb70ed7
Autor:
Herbert F. Jelinek, Jemal H. Abawajy, David J. Cornforth, Adam Kowalczyk, Michael Negnevitsky, Morshed U. Chowdhury, Robert Krones, Andrei V. Kelarev
Publikováno v:
AIMS Medical Science, Vol 2, Iss 4, Pp 396-409 (2015)
Cardiac autonomic neuropathy (CAN) poses an important clinical problem, which often remains undetected due difficulty of conducting the current tests and their lack of sensitivity. CAN has been associated with growth in the risk of unexpected death i
Externí odkaz:
https://doaj.org/article/6980fb0c64594fb6a01ae2d252b8aeaa
Autor:
Herbert F. Jelinek, Jemal H. Abawajy, Andrei V. Kelarev, Morshed U. Chowdhury, Andrew Stranieri
Publikováno v:
AIMS Medical Science, Vol 1, Iss 1, Pp 1-12 (2014)
Cardiac autonomic neuropathy (CAN) is a well known complication of diabetes leading to impaired regulation of blood pressure and heart rate, and increases the risk of cardiac associated mortality of diabetes patients. The neurological diagnostics of
Externí odkaz:
https://doaj.org/article/99234de10a1649af975dcc23ff1128c0
Autor:
Andrei V Kelarev
This book contains the definitions of several ring constructions used in various applications. The concept of a groupoid-graded ring includes many of these constructions as special cases and makes it possible to unify the exposition. Recent research
Publikováno v:
Information Sciences. 543:125-142
For successful electronic voting (e-voting), it is critically important to ensure the security, privacy and verifiability of all steps. This paper uses Intel Software Guard Extensions (SGX) to achieve these goals and provide protection against malici
Publikováno v:
Future Generation Computer Systems. 112:859-874
In organizing elections, a difficult problem is to achieve trust of all voters in the tallying process. Practical elections often lead to recounting of the submitted votes and raise questions about the validity of many submitted votes. There are even
Publikováno v:
Distributed and Parallel Databases. 39:97-127
Private processing of database queries protects the confidentiality of sensitive data when queries are answered. It is important to design collusion-resistant protocols ensuring that privacy remains protected even when a certain number of honest-but-
Publikováno v:
IEEE Transactions on Cloud Computing. 8:473-483
This paper investigates the problem of minimizing data transfer between different data centers of the cloud during the neurological diagnostics of cardiac autonomic neuropathy (CAN). This problem has never been considered in the literature before. Al
Autor:
Jemal H. Abawajy, Andrei V. Kelarev
Publikováno v:
IEEE Transactions on Big Data. 5:282-292
Malicious software (malware) pose serious challenges for security of big data. The number and complexity of malware targeting Android devices have been exponentially increasing with the ever growing popularity of Android devices. To address this prob
Publikováno v:
Future Generation Computer Systems. 90:368-380
This article is devoted to the novel situation, where a large distributed cloud database is a union of several separate databases belonging to individual database owners who are not allowed to transfer their data for storage in locations different fr