Zobrazeno 1 - 10
of 406
pro vyhledávání: '"William J Buchanan"'
Autor:
Adel R. Alharbi, Jawad Ahmad, null Arshad, Sajjad Shaukat Jamal, Fawad Masood, Yazeed Yasin Ghadi, Nikolaos Pitropakis, William J Buchanan
Publikováno v:
Complexity, Vol 2022 (2022)
With the increasing volume of data transmission through insecure communication channels, big data security has become one of the important concerns in the cybersecurity domain. To address these concerns and keep data safe, a robust privacy-preserving
Externí odkaz:
https://doaj.org/article/2a633593d6424add91dcfd3636ec4abd
Publikováno v:
Blockchain in Healthcare Today (2020)
A substantial administrative burden is placed on healthcare professionals as they manage and progress through their careers. Identity verification, pre-employment screening and appraisals: the bureaucracy associated with each of these processes takes
Externí odkaz:
https://doaj.org/article/1c361ba9424b4b95a8ed1230d89c4332
Publikováno v:
The Journal of The British Blockchain Association, Vol 1, Iss 2, Pp 1-6 (2018)
We increasingly live in a world where there is a balance between the rights to privacy and the requirements for consent, and the rights of society to protect itself. Within this world, there is an ever-increasing requirement to protect the identities
Externí odkaz:
https://doaj.org/article/dddc9923e2d94e6b95b30a94ddc75fe7
Publikováno v:
Blockchain in Healthcare Today (2018)
There are several areas of healthcare and well-being that could be enhanced using blockchain technologies. These include device tracking, clinical trials, pharmaceutical tracing, and health insurance. Within device tracking, hospitals can trace their
Externí odkaz:
https://doaj.org/article/fcd2a8f834b94623bc112ea5e45ee8dd
Autor:
William J Buchanan, Naseem Naqvi
Publikováno v:
The Journal of The British Blockchain Association, Vol 1, Iss 1, Pp 43-44 (2018)
A blockchain enabled ‘Digital Single Economy” can act as a catalyst for growth and could provide a platform where borderless innovative practices will thrive and create a true collaborative global economy, with shared goals and objectives for the
Externí odkaz:
https://doaj.org/article/a79aee7c4dac4688bc14ac215a06a1fd
The General Data Protection Regulation is the latest, and one of the most stringent, regulations regarding Data Protection to be passed into law by the European Union. Fundamentally, it aims to protect the Rights and Freedoms of all the individuals i
Autor:
Owen Lo, William J. Buchanan, Sarwar Sayeed, Pavlos Papadopoulos, Nikolaos Pitropakis, Christos Chrysoulas
Publikováno v:
Sensors, Vol 22, Iss 6, p 2291 (2022)
E-governance is a process that aims to enhance a government’s ability to simplify all the processes that may involve government, citizens, businesses, and so on. The rapid evolution of digital technologies has often created the necessity for the es
Externí odkaz:
https://doaj.org/article/8c4718c2115c4a5093f00a24bff54a4f
Autor:
Safi Ullah, Muazzam A. Khan, Jawad Ahmad, Sajjad Shaukat Jamal, Zil e Huma, Muhammad Tahir Hassan, Nikolaos Pitropakis, Arshad, William J. Buchanan
Publikováno v:
Sensors, Vol 22, Iss 4, p 1340 (2022)
Internet of Vehicles (IoV) is an application of the Internet of Things (IoT) network that connects smart vehicles to the internet, and vehicles with each other. With the emergence of IoV technology, customers have placed great attention on smart vehi
Externí odkaz:
https://doaj.org/article/d32e1751a24747e592c35d3a7c56a307
Publikováno v:
Sensors, Vol 22, Iss 3, p 953 (2022)
Ransomware has become an increasingly popular type of malware across the past decade and continues to rise in popularity due to its high profitability. Organisations and enterprises have become prime targets for ransomware as they are more likely to
Externí odkaz:
https://doaj.org/article/c024787e2dc04eeb90b1d94400e59a08
Autor:
Kris Hughes, Pavlos Papadopoulos, Nikolaos Pitropakis, Adrian Smales, Jawad Ahmad, William J. Buchanan
Publikováno v:
Computers, Vol 10, Iss 12, p 165 (2021)
Web browsers are one of the most used applications on every computational device in our days. Hence, they play a pivotal role in any forensic investigation and help determine if nefarious or suspicious activity has occurred on that device. Our study
Externí odkaz:
https://doaj.org/article/b95c9575b5584d3c9fb9d992af9e0b08