Zobrazeno 1 - 10
of 2 083
pro vyhledávání: '"Proxy re-encryption"'
Publikováno v:
Journal of Cloud Computing: Advances, Systems and Applications, Vol 13, Iss 1, Pp 1-20 (2024)
Abstract The smart collection and sharing of data is an important part of cloud-based systems, since huge amounts of data are being created all the time. This feature allows users to distribute data to particular recipients, while also allowing data
Externí odkaz:
https://doaj.org/article/e1afd9895d894b6585e47cb500c17ca3
Publikováno v:
Journal of King Saud University: Computer and Information Sciences, Vol 36, Iss 6, Pp 102105- (2024)
The construction of IoT cloud platform brings great convenience to the storage of massive IoT node data. To ensure security of data collected by the IoT nodes, the data must be encrypted when the nodes upload it. However, it arises some challenge pro
Externí odkaz:
https://doaj.org/article/2d07db6719504f3a994627e947942b83
Publikováno v:
Journal of Cloud Computing: Advances, Systems and Applications, Vol 13, Iss 1, Pp 1-13 (2024)
Abstract With the rapid development of the Internet of Medical Things (IoMT) and the increasing concern for personal health, sharing Electronic Medical Record (EMR) data is widely recognized as a crucial method for enhancing the quality of care and r
Externí odkaz:
https://doaj.org/article/3c76be0710694018844fe5e32327197e
Innovative Energy-Efficient Proxy Re-Encryption for Secure Data Exchange in Wireless Sensor Networks
Publikováno v:
IEEE Access, Vol 12, Pp 23290-23304 (2024)
In the realm of wireless sensor networks (WSNs), preserving data integrity, privacy, and security against cyberthreats is paramount. Proxy re-encryption (PRE) plays a pivotal role in ensuring secure intra-network communication. However, existing PRE
Externí odkaz:
https://doaj.org/article/b150b3d228d54c19900942f1057798ee
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Autor:
Somchart Fugkeaw
Publikováno v:
Journal of Cloud Computing: Advances, Systems and Applications, Vol 12, Iss 1, Pp 1-14 (2023)
Abstract Implementing a trust and secure immunity or vaccine passport verification system is now crucial for many countries. The system typically aims to enable the secure access control and verification of vaccination records which will be used by t
Externí odkaz:
https://doaj.org/article/db3272103cd74f1f8828c07d86bb528a
Publikováno v:
Applied Sciences, Vol 14, Iss 12, p 5005 (2024)
This study examines the issues of privacy protection, data security, and query efficiency in blockchain-based electronic medical record (EMR) sharing. It proposes a secure storage and sharing scheme for EMR based on Hyperledger Fabric and the InterPl
Externí odkaz:
https://doaj.org/article/61b6a80e9a5646848bc841078ada7d4c
Publikováno v:
Symmetry, Vol 16, Iss 6, p 726 (2024)
Currently, Internet of Things (IoT)-based cloud systems face several problems such as privacy leakage, failure in centralized operation, managing IoT devices, and malicious attacks. The data transmission between the cloud and healthcare IoT needs tru
Externí odkaz:
https://doaj.org/article/0b25c9fa5ca545398aa5d376af70f897
Publikováno v:
Mathematics, Vol 12, Iss 7, p 1120 (2024)
Real-time electrical impedance tomography (EIT) data sharing is becoming increasingly necessary, due to the extensive use of EIT technology in various sectors, including material analysis, biomedicine, and industrial process monitoring. The prevalenc
Externí odkaz:
https://doaj.org/article/958f53b91a914dada1ef40929630f376
Publikováno v:
IET Blockchain, Vol 3, Iss 1, Pp 18-34 (2023)
Abstract With the rapid increment of the demand for data sharing among parties, data is considered a cornerstone component to provide value in the big data environment. Concerns regarding sharing data security have impeded the development of cross‐
Externí odkaz:
https://doaj.org/article/a2499af8159c4f8c9e55a59d610e85df