Suggested Topics within your search.
Suggested Topics within your search.
-
1881
Secure deduplication and integrity audit system based on convergent encryption for cloud storage
Published 2017-11-01“…Cloud storage applications quickly become the best choice of the personal user and enterprise storage with its convenience,scalability and other advantages,secure deduplication and integrity auditing are key issues for cloud storage.At first,convergent key encapsulation/decoupling algorithm based on blind signature was set up,which could securely store key and enable it to deduplicate.Besides,a BLS signature algorithm based on convergence key was provided and use TTP to store public key and proxy audit which enables signature and pubic key deduplication and reduces client storage and computing overhead.Finally,cloud-based secure deduplicaion and integrity audit system was designed and implemented.It offered user with data privacy protection,deduplication authentication,audit authentication services and lowered client and cloud computation overhead.…”
Get full text
Article -
1882
Law Enforcement of Cybercrime: Tracking Digital Footprints of Cross-Border Hackers
Published 2025-06-01“…The analysis highlights the use of cloud storage as a media to store the proceeds of crime, in the form of data privacy. …”
Get full text
Article -
1883
Towards Tamper-Proof Trust Evaluation of Internet of Things Nodes Leveraging IOTA Ledger
Published 2025-07-01“…To overcome these obstacles, this study offers a novel approach for evaluating trust that uses IOTA Tangle technology. By decentralizing the trust evaluation process, our approach reduces the risks related to centralized solutions, including privacy violations and single points of failure. …”
Get full text
Article -
1884
A balancing act: exploring ethical and legal concerns associated with release of personal information in alert systems for missing persons with dementia
Published 2025-05-01“…We conducted a thematic analysis of the interview data to inductively explore ethical and legal concerns. …”
Get full text
Article -
1885
Integrating Machine Learning and IoT for Effective Plant Disease Management
Published 2025-01-01“…Further, the framework is structured for privacy of data and security using strong encryption and secure access protocols. …”
Get full text
Article -
1886
Platform framework for blockchain-enhanced healthcare AIoT systems
Published 2025-04-01“…Theoretical analysis demonstrates that the use of a sharding blockchain significantly enhances memory efficiency and reduces data retrieval time in healthcare AIoT applications. …”
Get full text
Article -
1887
Regulating cryptocurrencies in a post-pandemic global economy: A comparative legal analysis of the EU, the US, and Russia
Published 2025-09-01“…Drawing on a comparative analysis of Russia, the European Union, the United States, and Malta, it evaluates the effectiveness of CBDC-integrated anti-money laundering (AML) mechanisms in addressing the three key stages of illicit finance: placement, layering, and integration. Using primary sources, including pilot program data, legislative texts, and policy consultations, alongside secondary academic literature, the Study explores how design elements such as ledger visibility, programmable transaction limits, sanctions screening, and tiered privacy structures can be embedded into CBDC infrastructure. …”
Get full text
Article -
1888
Enhancing Software Sustainability: Leveraging Large Language Models to Evaluate Security Requirements Fulfillment in Requirements Engineering
Published 2025-02-01“…In the digital era, cybersecurity is integral for preserving national security, digital privacy, and social sustainability. This research emphasizes the role of non-functional equirements (NFRs) in developing secure software systems that enhance societal wellbeing by ensuring data protection, user privacy, and system robustness. …”
Get full text
Article -
1889
An Efficient Architecture for Edge AI Federated Learning With Homomorphic Encryption
Published 2025-01-01“…With the rapid growth of edge AI applications, there is an increasing demand for federated learning (FL) frameworks that are both efficient and privacy-preserving. This work introduces a robust approach that leverages homomorphic encryption (HE) to ensure data confidentiality during decentralized training. …”
Get full text
Article -
1890
Dual defense: Combining preemptive exclusion of members and knowledge distillation to mitigate membership inference attacks
Published 2025-01-01“…Membership inference (MI) attacks threaten user privacy through determining if a given data example has been used to train a target model. …”
Get full text
Article -
1891
A Survey of Machine Learning in Edge Computing: Techniques, Frameworks, Applications, Issues, and Research Directions
Published 2024-06-01“…Hot topics included big data, cloud, edge, multimedia, security, privacy, QoS, and activity recognition, while critical domains included industry, healthcare, agriculture, transportation, smart homes and cities, and assisted living. …”
Get full text
Article -
1892
Examining Factors Impacting Online Survey Response Rates in Educational Research: Perceptions of Graduate Students
Published 2017-09-01“…The authors used descriptive statistics (percentage, average mean) and inferential statistics (chi-square and correlations) to report the data analysis and findings. …”
Get full text
Article -
1893
How do strategic attributes of electronic commerce impel the perceived value and electronic loyalty of online food delivery applications (OFDAs)
Published 2024-08-01“…Design/methodology/approach – The study was quantitative and data were collected from 509 consumers of the district of Rawalpindi, Punjab Pakistan by using a convenience sampling technique who was the users of OFDAs to evaluate the proposed research model. …”
Get full text
Article -
1894
HIV Self-Testing among Men Who Have Sex with Men (MSM) in the UK: A Qualitative Study of Barriers and Facilitators, Intervention Preferences and Perceived Impacts.
Published 2016-01-01“…The window period was the most important element of an HIVST, with strong preference for 4th generation testing. Kits which used a blood sample were more popular than those using saliva due to higher perceived accuracy although phobia of needles and/or blood meant some would only access HIVST if a saliva sample option was available. …”
Get full text
Article -
1895
Artificial Intelligence in Healthcare: Medical Students' Perspectives on Balancing Innovation, Ethics, and Patient-Centered Care
Published 2025-03-01“…Additionally, concerns about data ownership, consent, and commercial use of patient information demand renewed attention to privacy and transparency. …”
Get full text
Article -
1896
The Intersection of AI, Ethics, and Journalism: Greek Journalists’ and Academics’ Perspectives
Published 2025-01-01“…Regarding ethical concerns, there is evident skepticism and caution among journalists and academics about issues, such as, data bias, transparency, privacy, and copyright, which are further intensified by the absence of a regulatory framework.…”
Get full text
Article -
1897
Exploring internal challenges and coping strategies in online English learning via Google Meet: A study of 7th grade students in Yogyakarta
Published 2024-10-01“…Data were collected through interviews and documentation, with pseudonyms used to protect students' privacy. …”
Get full text
Article -
1898
Exploring the Barriers and Facilitators to Implementing a Smartphone App for Physicians to Improve the Management of Acute Myocardial Infarctions: Multicenter, Mixed Methods, Obser...
Published 2025-07-01“…The surveys identified key barriers around technology, privacy, and access to required Wi-Fi that needed to be addressed during app implementation to facilitate uptake and use. …”
Get full text
Article -
1899
Improving the Accuracy of mmWave Radar for Ethical Patient Monitoring in Mental Health Settings
Published 2024-09-01“…Our solution uses an unscented Kalman filter for target tracking over time and analyses features of movement to determine whether targets are human or not. …”
Get full text
Article -
1900
The Influence of Fintech on the National Security System: Law, Economic Potential and Digital Defense Strategy
Published 2025-06-01“…Governments need to implement stringent regulations to safeguard Fintech user data and privacy and closely supervise Fintech operations to mitigate the risks of financial technology misuse. …”
Get full text
Article